IT Management  >   Systems Operations  >   Security  >  

Web-based Application Security

RSS Feed   
Web-based Application Security Reports
 
New Research Reveals Key Strategy to Manage Open Source Security
sponsored by WhiteSource
WEBCAST: Open source is a dominant factor in the evolution of technology and technology is now highly dependent on open source software (OSS). Although, OSS is not without risks. Listen as Scott Crawford from 451 Research discusses the rise of OSS, security composition analysis and ways to handle security vulnerabilities.
Posted: 09 Jan 2019 | Premiered: Nov 20, 2018

TOPICS: 
WhiteSource

PCI Council issues mobile application rules for software developers
sponsored by SearchSecurity.com
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TOPICS: 
SearchSecurity.com

The IT Security Confidant Vanishing Perimeter Sub
sponsored by Symantec
WEBCAST: The world of IT security has seen a vanishing perimeter in recent years. This has resulted from the increased usage of cloud which has made it for difficult for companies to secure mobile devices. In this webcast, learn about a simple, complete and cost-effective cloud security solution from Symantec.
Posted: 31 Jan 2019 | Premiered: Jan 31, 2019

TOPICS: 
Symantec

The Beginner's Guide to Threat Hunting
sponsored by DomainTools
WEBCAST: Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents. In this webcast, learn about the key steps to creating a threat hunting process.
Posted: 11 Jan 2019 | Premiered: Dec 31, 2018

TOPICS: 
DomainTools

Your Current Approach to Threat Detection & Neutralization is Broken
sponsored by ThreatX
VIDEO: The complexity of modern cloud, web application, and legacy environments along with mobile, IoT, and web APIs have created a vast attack surface that simply can't be managed by current rules-based approaches and WAF. This webinar covers the challenges and new approaches to threat analysis, and more.
Posted: 02 Jul 2018 | Premiered: 02 Jul 2018

TOPICS: 
ThreatX

BMC Software Relies on ThreatX to Protect Its Vast Portfolio of Enterprise Applications and Websites Across a Multi-Cloud Environment
sponsored by ThreatX
CASE STUDY: A premier provider of global IT Management found that their traditional security tools could not effectively support and protect their rapidly evolving cloud application portfolio. Find out how they were able to protect their critical business portfolio applications and websites distributed globally across a hybrid cloud environment.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

TOPICS: 
ThreatX

Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO: Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013

TOPICS: 
CenterBeam

An Integrated Approach to Managing Application Security
sponsored by IBM
WHITE PAPER: This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

TOPICS: 
IBM

Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER: This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

TOPICS: 
EMC Corporation

Why Web Application Attacks are a Growing Threat to the Cloud
sponsored by Oracle Dyn
ESSENTIAL GUIDE: New research found that web application attacks present a significant threat to cloud environments. Find out what cybersecurity expert, Rob Shapland, has to say as he explains these risks and what enterprises should do about them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

TOPICS: 
Oracle Dyn
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement