IT Management  >   Systems Operations  >   Security  >  

Web-based Application Security

RSS Feed   
Web-based Application Security Reports
 
How to solve DNS security issues in your organization
sponsored by TechTarget
RESOURCE: The urgency to implement DDoS protection has never been higher. Without better protection, brand damage, revenue loss and hefty fines can occur. In fact, according to Neustar's Q1 2019 Threats & Trends Report, there has been a 200% increase in the number of DDoS attacks comparing Q1, 2019 to Q1, 2018. Luckily, a secure DNS can
Posted: 03 Aug 2019 | Published: 03 Oct 2019

TechTarget

6 Security Facts that Organizations aren't Considering
sponsored by The Media Trust
WHITE PAPER: In this white paper, discover the 6 security facts that you should start considering to make your websites more secure.
Posted: 03 Jul 2019 | Published: 03 Jul 2019

The Media Trust

Web Application Authorization and Authentication Explained
sponsored by WhiteHat Security
VIDEO: According to the 2017 Verizon DBIR, 30% of total breaches reported involved attacks on web applications. Explore this webinar to gain insight into application authorization and authentication in order to enhance your application security program.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

WhiteHat Security

State of the Web Report 2019
sponsored by Tala Security
ANALYST REPORT: The website is a primary connection point between companies and their customers. Unfortunately, their architecture introduces critical vulnerabilities that enable client-side website attacks. In this research report, discover the risks associated with web and web app security and learn how to better protect your organization against attacks.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Tala Security

The Hacker Report
sponsored by HackerOne
WHITE PAPER: Many hackers are finding career building opportunities through bug bounties, with companies hiring from within the hacker community at a faster clip than ever before. As hacking grows in popularity, training continues to be a focus. Download this research report that details more than 300,000 individuals who represent the hacker community today.
Posted: 08 Mar 2019 | Published: 08 Mar 2019

HackerOne

Advanced Authentication Technologies for Detecting Real-time Threats to Banks
sponsored by HID Global
WHITE PAPER: Any financial institution or business that offers online financial services is a top target for hackers. If customers connecting to banking applications are doing so via infected devices, the malware resident can collect sensitive information. In this white paper, learn how ActivID Threat Detection Services can help protect your sensitive data.
Posted: 12 Apr 2019 | Published: 25 May 2016

HID Global

New 2019 Cybercrime Report Tracks Growing Threat of Networked Cybercrime
sponsored by LexisNexis® Risk Solutions
WEBCAST: The LexisNexis® Risk Solutions Cybercrime Report provides unique insight into global transaction patterns and emerging cybercrime threats. Join this 50-minute webinar to learn key findings and insights from the 2019 LexisNexis® Risk Solutions Cybercrime Report.
Posted: 06 Nov 2019 | Premiered: Nov 6, 2019

LexisNexis® Risk Solutions

Automating Cybercrime with Sentry MBA
sponsored by Shape Security
RESOURCE: Sentry MBA is an automated attack tool used by cybercriminals to take over user accounts on major websites. In this brief, gain a better understanding of how Sentry MBA works to help you defend against credential stuffing attacks.
Posted: 28 Aug 2019 | Published: 28 Aug 2019

Shape Security

Protect Your Online Business From Credential Stuffing
sponsored by Akamai Technologies
WHITE PAPER: Understanding credential stuffing threats, their increasing sophistication, and the best approaches for stopping them can help you safeguard your business. In this white paper, explore a bot management system that can help you successfully manage and mitigate credential stuffing attacks today.
Posted: 27 Dec 2018 | Published: 27 Dec 2018

Akamai Technologies

Protect Your Organization From Unwanted Cryptomining
sponsored by Cisco Umbrella
WHITE PAPER: Malicious cryptomining is a browser or software-based threat that enables bad actors to secretly use a business' computing power to mine digital currency. Bad actors are drawn to cryptomining because it's an easy and anonymous way for them to generate cash. In this white paper, learn how to protect your organization from cryptomining.
Posted: 02 May 2019 | Published: 02 May 2019

Cisco Umbrella
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement