IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed   
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: JavaScript hijacking is a technique that an attacker can use to masquerade as a valid user and read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML). Nearly all major Ajax applications have been found vulnerable.JavaScript hijacking allows a hacker to gain access to data through a loophole in which an interactive Web site on a given domain  … 

Web Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Web Application Security Reports
51 - 75 of 211 Matches Previous Page  |  Next Page
Retail Guide: How to Stay Secure as a Retailer Using Cloud to Revolutionize the Customer Experience
sponsored by DivvyCloud
WHITE PAPER: Today’s retailers are facing stress on several fronts: Customer demands for improved experience, competitive pressures, and the need to ensure regulatory compliance. This cloud security guide for retailers breaks down these common challenges and offers pragmatic advice for developing a roadmap for security and compliance.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

DivvyCloud

Keeping your Cloud out of the News
sponsored by DivvyCloud
WHITE PAPER: It’s a common misconception that embracing cloud requires forfeiture of security. In fact, Gartner predicts that through 2022, at least 95% of cloud security failures will be the customer’s fault, not the provider. This white paper illustrates where the faults lie and explores how DivvyCloud may be able to help.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

DivvyCloud

How to Secure Your Remote Workers
sponsored by Cisco Umbrella
EBOOK: In this e-book, discover the challenges facing today's security professionals and simple actions you can take to reduce malware, simplify security and improve network performance.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

Cisco Umbrella

How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Veracode, Inc.

Top 9 DDOS Threats Your Organization Must be Prepared For
sponsored by Radware
WHITE PAPER: Each year, cyberattacks grow in frequency and sophistication, leading to varied methods of conducting the same attacks. For distributed denial-of-service (DDoS) attacks, preparing for the “common” attack is no longer enough. This white paper contains the top 9 DDoS threats your organization needs to keep an eye on.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

Radware

Machina Tools — SDKs
sponsored by Ionic Security
PRODUCT OVERVIEW: An issue plaguing today’s networks is the siloed approach to security and management, allowing hackers to exploit the gaps and enter your network. In this solution brief, take a closer look at Ionic’s Machina Tools, designed to close these gaps and unify your security strategy.
Posted: 05 Mar 2020 | Published: 05 Mar 2020

Ionic Security

Top 5 Use Cases for Cisco Umbrella
sponsored by Cisco Umbrella
RESOURCE: The modern workplace has evolved to include remote access and mobile devices, while also introducing a new generation of complex security threats. In this e-book, 5 customers share the unique ways Cisco Umbrella protects their network. Read on to unlock the use cases.
Posted: 04 Mar 2020 | Published: 04 Mar 2020

Cisco Umbrella

Implementing Privacy Policy: Application Security the Easy Way
sponsored by Ionic Security
WEBCAST: The fundamental issue with data protection is that security is often siloed, but sensitive data isn’t, leaving apps and data at risk. This webcast takes a closer look at Ionic Machina, which focuses on data protection through scalability, visibility, and access management controls. Watch now to learn more.
Posted: 04 Mar 2020 | Premiered: Mar 4, 2020

Ionic Security

Application Security: The Easy Way
sponsored by Ionic Security
RESOURCE: Securing internal applications is a top priority among IT security teams. Yet achieving it is time & resource consuming. In fact, 76% of total IT expenditure is spent on securing internal apps. It doesn’t need to be so difficult – this blog post highlights how Ionic’s data-centric Machina Tools may be able to help. Read on to learn more.
Posted: 03 Mar 2020 | Published: 16 Aug 2018

Ionic Security

HOW TO KEEP APIs SECURE FROM BOT CYBERATTACKS
sponsored by Radware
WHITE PAPER: Application programming interfaces (APIs) have emerged as the bridge to facilitate communication between different application architectures. Despite their rapid and widespread deployment, APIs remain poorly protected and can leave business-critical services are at risk due to bot attacks. Learn how you can stay protected in this white paper.
Posted: 27 Feb 2020 | Published: 27 Feb 2020

Radware

Ultimate Guide to Bot Management
sponsored by Radware
EBOOK: Bots have completely revolutionized the way we interact digitally. In fact, bots account for more than half of all internet traffic. Unfortunately, some bots play a more sinister role – committing acts of fraud. In this e-book, explore the threats posed by malicious bots and discover tactics for detecting & mitigating these risks.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

Radware

THE FOUR BIGGEST CHALLENGES TO KEEPING MODERN APPLICATIONS SECURE
sponsored by Radware
WHITE PAPER: According to a recent study, just 33% of organizations feel their web application firewall (WAF) addresses all application-targeted threats. While implementing a WAF is an important starting point for ensuring the protection of modern apps, there are other key challenges and threats to consider. Download this report to learn more.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

Radware

How a Fortune 15 Technology Enterprise Proactively Detects Advanced Threats With DomainTools
sponsored by DomainTools
CASE STUDY: A Fortune 15 multinational technology company needed to identify malicious and copycat domains that might be used as a future attack vector against their infrastructure. In this case study, see how DomainTools allowed them to accelerate identification and response to potential domain-based threats, and much more.
Posted: 05 Feb 2020 | Published: 05 Feb 2020

DomainTools

Detecting Malicious Domains Using Artificial Intelligence and Machine Learning
sponsored by DomainTools
WHITE PAPER: As cybercriminals deploy more sophisticated attack methods to avoid detection, organizations need to ensure their security tactics can evolve at the pace of these threats. Download this white paper to take a closer look at how machine learning & AI can bolster your security by detecting malicious activity across various domains.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

DomainTools

The Beginner's Guide to Threat Hunting
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents. In this webcast, learn about the key steps to creating a threat hunting process.
Posted: 11 Jan 2019 | Premiered: Dec 31, 2018

DomainTools

Dynamic Cyber Defenses A Fresh Approach to an Old Problem
sponsored by ThreatX
RESEARCH CONTENT: In this Frost & Sullivan report, learn why the standard approach of blocking malicious activity has structural shortcomings, and how these prevention shortcomings favor attackers. Also uncover insight about a cloud-based deception approach and a rule-less WAF.
Posted: 02 Jul 2018 | Published: 06 Apr 2018

ThreatX

Right Tool but Wrong Model: Are your defenses against web application attacks falling further behind?
sponsored by ThreatX
RESEARCH CONTENT: Dive into this 11-page Frost & Sullivan Report to learn why web applications are under attack, the costs associated with an attack and how you can revamp your current web application firewall strategy to continue your business engagements with confidence.
Posted: 28 Jun 2018 | Published: 30 Jun 2018

ThreatX

What secure email gateways can do for your enterprise
sponsored by SearchSecurity.com
EBOOK: It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

SearchSecurity.com

Assess Secure Web Gateways to Suit Your Network Security Needs
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: Secure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

SearchSecurity.com

Why Web Application Attacks are a Growing Threat to the Cloud
sponsored by Oracle Dyn
ESSENTIAL GUIDE: New research found that web application attacks present a significant threat to cloud environments. Find out what cybersecurity expert, Rob Shapland, has to say as he explains these risks and what enterprises should do about them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Oracle Dyn

Cryptojacking Attacks May Not Challenge Ransomware Dominance
sponsored by Cisco Umbrella
EGUIDE: Cryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.
Posted: 28 Aug 2018 | Published: 12 Apr 2018

Cisco Umbrella

All You Need to Know about SSO
sponsored by HYPR
EGUIDE: The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.
Posted: 14 Mar 2018 | Published: 09 Mar 2018

HYPR

How to Address Key SSL Security Issues and Vulnerabilities
sponsored by A10 Networks
EGUIDE: Don't compromise your website security. Explore this expert e-guide to reveal the new SSL security landscape and uncover emerging security issues within SSL technology.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

A10 Networks

Use a web app firewall to halt app attacks
sponsored by SearchSecurity.com
EBOOK: Web application firewalls are more essential than ever when it comes to halting app attacks. Learn what features and functions you should look for when choosing a new WAF.
Posted: 07 Feb 2017 | Published: 05 Feb 2017

SearchSecurity.com

What to Look for in Web Fraud Detection Systems
sponsored by SearchSecurity.com
EBOOK: In this TechTarget Buyer's Guide readers will learn the key features of a Web fraud detection product and how to choose the best product for their company.
Posted: 28 Sep 2016 | Published: 23 Mar 2016

SearchSecurity.com
51 - 75 of 211 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences