IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed   
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: JavaScript hijacking is a technique that an attacker can use to masquerade as a valid user and read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML). Nearly all major Ajax applications have been found vulnerable.JavaScript hijacking allows a hacker to gain access to data through a loophole in which an interactive Web site on a given domain  … 

Web Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Web Application Security Reports
1 - 25 of 317 Matches Previous Page  |  Next Page
Dynamic Program Analysis and Static Code Analysis in Web Security
sponsored by Acunetix
RESOURCE: Dive into this article to learn about the advantages and disadvantages of Dynamic Application Security Testing (DAST) and Static Application Security Testing (SAST) and why they often work better together.
Posted: 29 May 2020 | Published: 29 May 2020

Acunetix

Duarte Unified School District Protects Students while Fostering Student Engagement with Absolute Web Usage
sponsored by Absolute Software Corporation
CASE STUDY: When students and teachers around the globe were asked to instantly adapt to a new distance learning phenomenon, the entire Duarte Unified School District turned to Absolute Web Usage to keep them secure during this time.
Posted: 29 May 2020 | Published: 29 May 2020

Absolute Software Corporation

Securing Your Wherever, Whenever Workforce
sponsored by Forcepoint
EBOOK: Mobile devices and cloud-based applications enable teams to work remotely and improve productivity, agility, and innovation. However, as these environments grow so too do the security challenges. In this e-book, explore today’s security risks and discover how to secure and support today’s remote workforce, along with their devices.
Posted: 28 May 2020 | Published: 28 May 2020

Forcepoint

Top 10 Security Events to Monitor in Azure Ad and Microsoft 365
sponsored by Quest
WHITE PAPER: Although cloud environments enable organizations to be more efficient, it often comes at the cost of additional vulnerabilities. In this e-book, take a closer look a 10 security events that administrators track closely to keep their cloud environments secure.
Posted: 28 May 2020 | Published: 28 May 2020

Quest

DAST vs SAST: A Case for Dynamic Application Security Testing
sponsored by Acunetix
RESOURCE: When it comes to performing a security test for business applications, most security teams have a preference: DAST or SAST. However, both play a key role in effective security testing strategies. Read this article to learn more about the strengths of implementing the DAST method, and how to address its weaknesses.
Posted: 28 May 2020 | Published: 06 Mar 2020

Acunetix

OWASP Top 10: The Most Critical Risks Facing Web Applications
sponsored by F5 Networks
WEBCAST: Today’s organization uses an average of 983 different applications. As such, ensuring the protection of these web applications is critical for avoiding disruptive breaches and maintaining operational efficiency. In this webinar, explore the top 10 most critical risks facing today’s web applications and the steps you can take to mitigate them.
Posted: 28 May 2020 | Premiered: May 28, 2020

F5 Networks

Creating a DevSecOps Culture in Your Company
sponsored by Checkpoint Software Technologies
EBOOK: As organizations continue to embrace cloud architectures as their preferred business environment, security methods need to change to reflect the needs of an evolving landscape. In this e-book, you’ll learn more about why organizations are embracing DevSecOps and the Shared Responsibility Model to meet cloud security challenges.
Posted: 21 May 2020 | Published: 21 May 2020

Checkpoint Software Technologies

Best Practices for Remote Access in Disaster Mitigation and Recovery Scenarios
sponsored by Checkpoint Software Technologies
WHITE PAPER: Given current circumstances, it’s no surprise to see organizations enabling mass amounts of employees with remote access to their network. However, if done frantically, this shift can expose vulnerabilities. Download this white paper for guidance on implementing secure access for remote employees.
Posted: 21 May 2020 | Published: 21 May 2020

Checkpoint Software Technologies

Solving the Challenges of Modern Remote Access
sponsored by Barracuda
WHITE PAPER: The recent pandemic has brought about a dramatic movement towards enabling users to work remotely. Included are the results from a recent study conducted by Gartner to help security and risk management leaders solve the challenges of quickly scaling large scale modern remote access. Read on to discover their key findings.
Posted: 20 May 2020 | Published: 25 Mar 2020

Barracuda

To Enable Zero Trust, Rethink Your Firewall Strategy
sponsored by VMware
ANALYST REPORT: IT organizations are spending more to secure their networks however, these investments are not always paying off. To better understand the challenges that businesses are facing in securing their internal network’s east-west traffic, VMware commissioned Forrester Consulting to conduct a survey. Download this report to explore key findings.
Posted: 20 May 2020 | Published: 29 Feb 2020

VMware

Punycode: Awareness and Protection
sponsored by Cisco Umbrella
VIDEO: The topic of this episode of A Cybersecurity Technical Mini Series: Punycode. But what is Punycode, how does it work & why is it important? To find out, join Chris Riviere, a security expert at Cisco as he further explores this malicious domain tactic.
Posted: 19 May 2020 | Premiered: 16 Dec 2019

Cisco Umbrella

Protecting Against the 10 Most Critical Web Security Risks
sponsored by Progress Software Corporation Sitefinity
RESEARCH CONTENT: This infographic identifies the top 10 most critical security risks to web applications – as outlined by the Open Web Application Security Project (OWASP) – and explores tactics and advice for defending against each threat. Read on to get started.
Posted: 18 May 2020 | Published: 18 May 2020


Cybersecurity and COVID-19: Securing Today’s Newly Distributed Workforce
sponsored by CrowdStrike
EBOOK: To play their part in ensuring the health and safety of their employees, organizations have quickly adopted a remote workforce model in order to maintain a semblance of ‘business as usual’. In this e-book, explore the security challenges organizations are seeing and discover how to embrace and secure a remote workforce.
Posted: 13 May 2020 | Published: 13 May 2020

CrowdStrike

What Is Endpoint Detection and Response (EDR)?
sponsored by VMware International Unlimited Company
RESOURCE: As cyberattackers find more creative and elaborate ways of bypassing security measures and infect endpoint, the reactionary nature of traditional security tools is becoming increasingly ineffective. So, what can organizations do to proactively ensure the security of their critical endpoints? Read this article to find out.
Posted: 13 May 2020 | Published: 13 May 2020

VMware International Unlimited Company

The Top 5 Open Source Vulnerabilities in Technology Companies
sponsored by Sonatype
WHITE PAPER: The tech industry relies on open source technology as a competitive advantage to enable their teams to bring products to market quickly. However, this increased speed also comes with risks. In this white paper, explore the top five areas of vulnerability plaguing organizations in the tech industry today.
Posted: 11 May 2020 | Published: 11 May 2020

Sonatype

The Imitation Game Detecting and Thwarting Automated Bot Attacks
sponsored by F5 Networks
WHITE PAPER: Bot attacks pose a critical threat to today’s organizations, and traditional security methods are unfit to keep pace with security demands. The following research report contains a summary of findings from a recent study conducted by EMA. The study was designed to better understand this threat and how to prevent it. Read on to unlock the results.
Posted: 08 May 2020 | Published: 29 Feb 2020

F5 Networks

How Are Websites Adapting to Surging Demand? Get Best Practice Tips & Avoid 6 Common Misconceptions
sponsored by Cloudflare
WEBCAST: The COVID-19 emergency is impacting online commerce for businesses around the world and organizations are forced to adjust to this ‘new normal’. However, there are few common misconceptions to be aware of when adapting your website to surging demand. In this webcast, explore these misconceptions.
Posted: 07 May 2020 | Premiered: May 7, 2020

Cloudflare

5 Ways to Maximize the Security, Performance and Reliability of Your Online Business
sponsored by Cloudflare
WHITE PAPER: Creating a superior online experience requires the right security and performance strategy. In this white paper, explore 5 key considerations that can help businesses meet customer needs and provide a secure and seamless user experience.
Posted: 06 May 2020 | Published: 06 May 2020

Cloudflare

How to Build Infrastructure to Deliver a Superior Online Experience
sponsored by Cloudflare
WHITE PAPER: As demand increases for web-based services and applications, businesses must satisfy customer needs while ensuring that their websites and apps remain secure, fast, and reliable. In this white paper, uncover 5 steps you can take to meet customer needs and provide a secure and seamless user experience.
Posted: 06 May 2020 | Published: 06 May 2020

Cloudflare

Industry and Financial Regulations: The Implications for Application Security
sponsored by Veracode, Inc.
WEBCAST: Today’s financial institutions face stringent regulations to ensure the responsible management and protection of sensitive user data. In this webinar, join Chris Wysopal, CTO and co-founder of Veracode, as they navigate the security and compliance implications of building and maintaining a mobile financial application.
Posted: 05 May 2020 | Premiered: May 5, 2020

Veracode, Inc.

3 Steps to Secure Remote Workers and Students
sponsored by Cisco Umbrella
VIDEO: As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.
Posted: 05 May 2020 | Premiered: 30 Mar 2020

Cisco Umbrella

E-commerce has been revolutionized in the last decade
sponsored by The Media Trust
WEBCAST: Most brands don’t control or manage 65-95% of the code that defines the digital shopping experience. While this code enables critical features, it exposes organizations to potential security risks. In this webinar, take a closer look at third-party risk areas and discover how to address these challenges.
Posted: 05 May 2020 | Premiered: May 5, 2020

The Media Trust

Power digital experiences. Secure the threats you don’t see.
sponsored by The Media Trust
RESOURCE: Most of the code that exists on a consumer-facing website is developed by third parties. For online retailers, awareness of the potential risks this presents is key to securing digital experiences for their users. In this article, learn more about the risks of third-party code and the steps you can take to ensure security.
Posted: 05 May 2020 | Published: 05 May 2020

The Media Trust

How to Combat Fileless Attacks
sponsored by VMware International Unlimited Company
WHITE PAPER: Cyberattackers are constantly devising new ways to target organizations, utilizing different methods or targeting untapped vectors. In this white paper, take an in-depth look at the increasing risk of fileless attack, how it works and ways to combat these threats.
Posted: 04 May 2020 | Published: 04 May 2020

VMware International Unlimited Company

Public Key Infrastructure (PKI) Buyers Guide
sponsored by Entrust, Inc.
WHITE PAPER: When it comes to digital interactions, trust is a key deciding factor. A popular way of gaining trust is the use of public key infrastructures (PKIs), which enable organizations to ensure end-to-end trust across user networks. This buyers guide offers expert advice for organizations looking to implement PKI. Read on to learn more.
Posted: 04 May 2020 | Published: 04 May 2020

Entrust, Inc.
1 - 25 of 317 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info