IT Management  >   Systems Operations  >   Security  >  

Web-based Application Security

RSS Feed   
Web-based Application Security Reports
 
Webinar: What's New in iOS 12 Security
sponsored by Data Theorem
WEBCAST: This webcast led by Phillip Tennen of Data Theorem explores the major changes in Apple's iOS 12. Watch now to learn about new security and privacy changes, how to take advantage of these changes and best practices to continuously improve privacy and data security for mobile apps.
Posted: 10 Apr 2019 | Premiered: Oct 22, 2018

Data Theorem

IP Intelligence Improves Company Efficiency, Customer Experience, and Security
sponsored by Neustar
WHITE PAPER: Successful brands are the ones that identify and connect with their customers – and that's why IP Intelligence (IPI) is so critical. IPI helps companies sort out the good actors from the bad, improving the customer experience while keeping security systems safe. In this white paper, learn how different companies have implemented Neustar's IPI.
Posted: 13 Feb 2019 | Published: 19 Jul 2017

Neustar

How To Analyze and Investigate Malicious Javascript Attacks
sponsored by DomainTools
WEBCAST: The increased frequency of JavaScript attacks creates big problems when trying to protect your users. JavaScript is the top language running on the web with 80% of the top 1 million sites using it in some capacity. In this webcast, Tarik Saleh, Keith Hoodlet and Paul Asadoorian will show you several different forms of malicious JavaScript.
Posted: 10 Jan 2019 | Premiered: Jan 10, 2019

DomainTools

Modern Defense in Depth: An Integrated Approach to Better Web Application Security
sponsored by Oracle Dyn
WHITE PAPER: Cyberattacks are still successful. Breaches continue to occur. And each time we ask the same questions: why and how did this happen? Many businesses know the steps they're taking to protect ourselves are clearly inadequate. In this book, learn how an integrated, platform-based approach can help you achieve better web application security.
Posted: 22 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

Protect Your Organization From Unwanted Cryptomining
sponsored by Cisco Umbrella
WHITE PAPER: Malicious cryptomining is a browser or software-based threat that enables bad actors to secretly use a business' computing power to mine digital currency. Bad actors are drawn to cryptomining because it's an easy and anonymous way for them to generate cash. In this white paper, learn how to protect your organization from cryptomining.
Posted: 02 May 2019 | Published: 02 May 2019

Cisco Umbrella

Orchestration of App-Driven Security Policies
sponsored by Silver Peak
WEBCAST: Take a look at this webcast to discover how to orchestrate security policies within applications.
Posted: 11 Dec 2017 | Premiered: Dec 11, 2017

Silver Peak

Exposed & At Risk: Why Your Approach to Web Application Security is Insufficient
sponsored by ThreatX
WEBCAST: Watch this webinar to learn about combining web app security approaches and modern web app firewall tech to address the rapidly evolving the security needs of hybrid cloud environments.
Posted: 29 Aug 2018 | Premiered: Aug 29, 2018

ThreatX

8 Steps to Zero Trust
sponsored by Akamai Technologies
RESOURCE: Use this step-by-step guide from Akamai's CTO, Charlie Gero, to build an inclusive & concrete zero trust architecture, to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time & reducing your migration risk profile.
Posted: 22 Jun 2018 | Published: 31 May 2018

Akamai Technologies

HP Fortify on Demand
sponsored by Hewlett Packard Enterprise
DATA SHEET: Access this data sheet to discover an on-demand solution that tests the security of software quickly, accurately, and affordably.
Posted: 18 Aug 2014 | Published: 31 Jul 2013

Hewlett Packard Enterprise

What to Look for in Web Application Firewall Products
sponsored by SearchSecurity.com
EBOOK: In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement