IT Management  >   Systems Operations  >   Security  >  

Web Application Security

RSS Feed   
ALSO CALLED: Web-based Application Security, Internet Application Security, Internet Applications Security
DEFINITION: JavaScript hijacking is a technique that an attacker can use to masquerade as a valid user and read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML). Nearly all major Ajax applications have been found vulnerable.JavaScript hijacking allows a hacker to gain access to data through a loophole in which an interactive Web site on a given domain  … 

Web Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Web Application Security Reports
76 - 100 of 279 Matches Previous Page  |  Next Page
State of the Internet / Security: Financial Services — Hostile Takeover Attempts
sponsored by Akamai
WHITE PAPER: Learn about spikes in credential stuffing attacks against APIs, LFI passing SQLi as a leading web attack vector, and a DDoS attack against one bank that reached an astounding 160 Gbps.
Posted: 04 Jun 2020 | Published: 04 Jun 2020

Akamai

Executive Brief: The Dark Side of Encryption
sponsored by SonicWall
WHITE PAPER: Encryption plays a key role in providing security for digital interactions. However, these encryption protocols can also serve as a lucrative vector for cybercriminals, allowing them to gain easy access to networks. This white paper explores how (and why) organizations should decrypt traffic in order to identity and mitigate potential threats.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SonicWall

Solving the Challenges of Modern Remote Access
sponsored by Barracuda
WHITE PAPER: The recent pandemic has brought about a dramatic movement towards enabling users to work remotely. Included are the results from a recent study conducted by Gartner to help security and risk management leaders solve the challenges of quickly scaling large scale modern remote access. Read on to discover their key findings.
Posted: 20 May 2020 | Published: 25 Mar 2020

Barracuda

To Enable Zero Trust, Rethink Your Firewall Strategy
sponsored by VMware
ANALYST REPORT: IT organizations are spending more to secure their networks however, these investments are not always paying off. To better understand the challenges that businesses are facing in securing their internal network’s east-west traffic, VMware commissioned Forrester Consulting to conduct a survey. Download this report to explore key findings.
Posted: 20 May 2020 | Published: 29 Feb 2020

VMware

Protecting Against the 10 Most Critical Web Security Risks
sponsored by Progress Software Corporation Sitefinity
RESEARCH CONTENT: This infographic identifies the top 10 most critical security risks to web applications – as outlined by the Open Web Application Security Project (OWASP) – and explores tactics and advice for defending against each threat. Read on to get started.
Posted: 18 May 2020 | Published: 18 May 2020


Cybersecurity and COVID-19: Securing Today’s Newly Distributed Workforce
sponsored by CrowdStrike
EBOOK: To play their part in ensuring the health and safety of their employees, organizations have quickly adopted a remote workforce model in order to maintain a semblance of ‘business as usual’. In this e-book, explore the security challenges organizations are seeing and discover how to embrace and secure a remote workforce.
Posted: 13 May 2020 | Published: 13 May 2020

CrowdStrike

What Is Endpoint Detection and Response (EDR)?
sponsored by VMware International Unlimited Company
RESOURCE: As cyberattackers find more creative and elaborate ways of bypassing security measures and infect endpoint, the reactionary nature of traditional security tools is becoming increasingly ineffective. So, what can organizations do to proactively ensure the security of their critical endpoints? Read this article to find out.
Posted: 13 May 2020 | Published: 13 May 2020

VMware International Unlimited Company

How Are Websites Adapting to Surging Demand? Get Best Practice Tips & Avoid 6 Common Misconceptions
sponsored by Cloudflare
WEBCAST: The COVID-19 emergency is impacting online commerce for businesses around the world and organizations are forced to adjust to this ‘new normal’. However, there are few common misconceptions to be aware of when adapting your website to surging demand. In this webcast, explore these misconceptions.
Posted: 07 May 2020 | Premiered: May 7, 2020

Cloudflare

5 Ways to Maximize the Security, Performance and Reliability of Your Online Business
sponsored by Cloudflare and Queue IT
WHITE PAPER: Creating a superior online experience requires the right security and performance strategy. In this white paper, explore 5 key considerations that can help businesses meet customer needs and provide a secure and seamless user experience.
Posted: 06 May 2020 | Published: 06 May 2020

Cloudflare and Queue IT

How to Build Infrastructure to Deliver a Superior Online Experience
sponsored by Cloudflare
WHITE PAPER: As demand increases for web-based services and applications, businesses must satisfy customer needs while ensuring that their websites and apps remain secure, fast, and reliable. In this white paper, uncover 5 steps you can take to meet customer needs and provide a secure and seamless user experience.
Posted: 06 May 2020 | Published: 06 May 2020

Cloudflare

Industry and Financial Regulations: The Implications for Application Security
sponsored by Veracode, Inc.
WEBCAST: Today’s financial institutions face stringent regulations to ensure the responsible management and protection of sensitive user data. In this webinar, join Chris Wysopal, CTO and co-founder of Veracode, as they navigate the security and compliance implications of building and maintaining a mobile financial application.
Posted: 05 May 2020 | Premiered: May 5, 2020

Veracode, Inc.

3 Steps to Secure Remote Workers and Students
sponsored by Cisco Umbrella
VIDEO: As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.
Posted: 05 May 2020 | Premiered: 30 Mar 2020

Cisco Umbrella

How to Combat Fileless Attacks
sponsored by VMware International Unlimited Company
WHITE PAPER: Cyberattackers are constantly devising new ways to target organizations, utilizing different methods or targeting untapped vectors. In this white paper, take an in-depth look at the increasing risk of fileless attack, how it works and ways to combat these threats.
Posted: 04 May 2020 | Published: 04 May 2020

VMware International Unlimited Company

The Malicious Bot Playbook: Early Warning Signs, and What to Do About Them
sponsored by Cloudflare
WHITE PAPER: Similar to social engineering attacks, bot attacks are highly targeted to expose the vulnerabilities of a specific organization. Understanding the telltale bot warning signs has proven to be an effective measure at predicting and preventing attacks. This playbook outlines the common warning signs and tactics for addressing them.
Posted: 01 May 2020 | Published: 01 May 2020

Cloudflare

Automatic Whole Database Encryption – How It Works
sponsored by NetLib Security
WHITE PAPER: In this online white paper are three diagrams that show a simplified, brief outline of how Encryptionizer works. Read on to get started.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

NetLib Security

Shifting Cloud Security Left with Infrastructure as Code
sponsored by DivvyCloud
WHITE PAPER: DevOps has forever changed the software development lifecycle for the better. But what is the role of DevOps in ensuring cloud security and compliance? This white paper highlights how addressing key challenges can be addressed by shifting cloud security left – avoiding misconfigurations and misalignments. Read on to learn more.
Posted: 22 Apr 2020 | Published: 22 Apr 2020

DivvyCloud

Your CISSP Prep Guide
sponsored by TechTarget
RESOURCE: Obtaining a CISSP certification is globally recognized as a standard of achievement for security professionals. And whether you have already obtained your CISSP certification or are studying for the test, our CISSP prep guide can help you! To gain access to this guide, provide your valuable insight in our Endpoint Security Research Survey.
Posted: 22 Apr 2020 | Published: 30 Apr 2019

TechTarget

NIST Application Security Revisions You Need to Know
sponsored by Contrast Security
RESOURCE: NIST is a standard leader in the cybersecurity space that sets guidelines for organizations to follow across different areas of security. This landing page contains several useful resources focusing on the NIST revisions to their application security guidelines.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

Contrast Security

Sentinel Auto API
sponsored by WhiteHat Security
DATA SHEET: Traditional API testing is manual, time-consuming, and widely unpopular. In fact, less than 25% of organizations are testing their APIs. However, the critical nature of APIs requires them to be protected. In this data sheet, take a closer look at the key features of Sentinel Auto API and see if it meets for your API security needs.
Posted: 16 Apr 2020 | Published: 16 Apr 2020

WhiteHat Security

Maintaining the Security Posture
sponsored by Onapsis
WHITE PAPER: Based on the critical nature of Enterprise Resource Planning (ERP) applications, they are often under attack by cybercriminals looking to cause disruptions. In this white paper, explore the top threats facing your business-critical applications and discover a list of security recommendations to help you get started.
Posted: 16 Apr 2020 | Published: 16 Apr 2020

Onapsis

How to Stay Secure as a Retailer Using Cloud to Improve the Customer Experience
sponsored by DivvyCloud
WHITE PAPER: Today’s retailers are facing stress on several fronts: Customer demands for improved experience, competitive pressures, and the need to ensure regulatory compliance. This cloud security guide for retailers breaks down these common challenges and offers pragmatic advice for developing a roadmap for security and compliance.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

DivvyCloud

Keeping your Cloud out of the News
sponsored by DivvyCloud
WHITE PAPER: It’s a common misconception that embracing cloud requires forfeiture of security. In fact, Gartner predicts that through 2022, at least 95% of cloud security failures will be the customer’s fault, not the provider. This white paper illustrates where the faults lie and explores how DivvyCloud may be able to help.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

DivvyCloud

Data Privacy at Automox: Why SaaS Applications Deliver Superior Security
sponsored by Automox
WHITE PAPER: Cloud computing has seen a meteoric rise from emerging trend to backbone of most technology infrastructures. The growing list of benefits that come from a cloud transformation often overshadow the most common concern – security. In this white paper, learn more about the current cloud security landscape and where it’s expected to go.
Posted: 14 Apr 2020 | Published: 14 Apr 2020


2020 Cyber Hygiene Report
sponsored by Automox
WHITE PAPER: Cyber hygiene, as defined by the Center for Internet Security, is a set of practices designed for proactively protecting organizations from threats. This report contains the findings from recent study into the overall cyber hygiene benefits and challenges across several organizations. Read on to see how you stack up to your peers.
Posted: 10 Apr 2020 | Published: 10 Apr 2020


AppSec Guide: Complying with New NIST SP 800-53 IAST & RASP Requirements
sponsored by Contrast Security
WHITE PAPER: The newly released AppSec requirements from the National Institute of Standards and Technology (NIST) outline the need to address specific software vulnerabilities in response to the increasing volume of automated attacks. This whitepaper highlights what to expect with the new requirements and provides 4 key steps for ensuring compliance.
Posted: 10 Apr 2020 | Published: 30 Mar 2020

Contrast Security
76 - 100 of 279 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info