IT Management  >   Systems Operations  >   Security  >  

Web-based Application Security

RSS Feed   
Web-based Application Security Reports
 
Decryption Powered by the Gigamon Visibility Fabric with GigaSMART
sponsored by Gigamon
RESOURCE: Learn how the Gigamon Visibility Fabric with licensed GigaSMART Decryption can enable operations teams to have full visibility into encrypted traffic on any TCP port or application.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Gigamon

Top 9 DDOS Threats Your Organization Must be Prepared For
sponsored by Radware
WHITE PAPER: Each year, cyberattacks grow in frequency and sophistication, leading to varied methods of conducting the same attacks. For distributed denial-of-service (DDoS) attacks, preparing for the “common” attack is no longer enough. This white paper contains the top 9 DDoS threats your organization needs to keep an eye on.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

Radware

The Forrester Wave™: DDoS Mitigation Solutions, Q1 2021
sponsored by Cloudflare
ANALYST REPORT: According to Forrester’s 2021 research, DDoS protection customers should be looking for providers that: protect cloud assets, can defend layer 7 without a WAF, and automate – not just detect, but respond. Download the full Forrester Wave report to see how vendors in the DDoS protection space such as Cloudflare, Akamai, Radware stack up.
Posted: 26 Mar 2021 | Published: 03 Mar 2021

Cloudflare

5 Critical Mistakes When Evaluating A Nextgeneration Firewall
sponsored by Palo Alto Networks
EBOOK: Download this e-book for 5 critical mistakes when evaluating a next-generation firewall.
Posted: 16 Mar 2021 | Published: 16 Mar 2021

Palo Alto Networks

Hidden Text and Zero Font Attacks
sponsored by Inky Technology
RESOURCE: You may have heard that some phishing emails use something called zero font — text hidden in an email by various means. It is a brand forgery email intended to harvest login credentials. But what exactly is this technique, and why do attackers use it? Read this document to learn both the why and the how of hidden text and zero font.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Inky Technology

Evaluating Client-side Web Security: Questions to Ask Your Vendor
sponsored by Tala Security
WHITE PAPER: When it comes to online interactions, protecting end-users from Magecart, XSS and other data theft attacks is critical to safeguarding both their sensitive data as well as brand reputation. This article offers 3 questions you should be asking your web security vendor – and why they matter.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Tala Security

Dynamic Cyber Defenses A Fresh Approach to an Old Problem
sponsored by ThreatX
RESEARCH CONTENT: In this Frost & Sullivan report, learn why the standard approach of blocking malicious activity has structural shortcomings, and how these prevention shortcomings favor attackers. Also uncover insight about a cloud-based deception approach and a rule-less WAF.
Posted: 02 Jul 2018 | Published: 06 Apr 2018

ThreatX

Addressing Complexity and Expertise in Application Security Testing
sponsored by WhiteHat Security
RESEARCH CONTENT: The Verizon’s 2020 DBIR indicated that 43% of data breaches begin by targeting a web application. This discovery has begun to shift the cybersecurity paradigm from focusing on on-premise infrastructures to protecting their web apps with application security testing (AST). Read this 451 Research brief to learn more about AST.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

WhiteHat Security

Tala At RSAC Innovation Sandbox: Threats To Cybersecurity
sponsored by Tala Security
WHITE PAPER: In this short white paper, the CEO of Tala Security, Aanand Krishnan, reveals his business experiences during pandemic and why cybersecurity is more important than ever before. Download the PDF to uncover his thoughts and cybersecurity advice.
Posted: 17 Aug 2020 | Published: 17 Aug 2020

Tala Security

Why Web Application Attacks are a Growing Threat to the Cloud
sponsored by Oracle Dyn
ESSENTIAL GUIDE: New research found that web application attacks present a significant threat to cloud environments. Find out what cybersecurity expert, Rob Shapland, has to say as he explains these risks and what enterprises should do about them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Oracle Dyn
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences