IT Management  >   Systems Operations  >   Security  >  

Web-based Application Security

RSS Feed   
Web-based Application Security Reports
 
Enabling Secure Remote Working in Times of Crisis: Plan Ahead
sponsored by Thales
RESOURCE: As the global remote workforce continues to grow, security efforts need to be adjusted to focus on protecting distributed users and their access to critical data. This article highlights the challenges and best practices for security todays’ remote workforce. Read on to get started.
Posted: 30 Apr 2020 | Published: 19 Mar 2020

Thales

What Is Endpoint Detection and Response (EDR)?
sponsored by VMware International Unlimited Company
RESOURCE: As cyberattackers find more creative and elaborate ways of bypassing security measures and infect endpoint, the reactionary nature of traditional security tools is becoming increasingly ineffective. So, what can organizations do to proactively ensure the security of their critical endpoints? Read this article to find out.
Posted: 13 May 2020 | Published: 13 May 2020

VMware International Unlimited Company

How to Stay Secure as a Retailer Using Cloud to Improve the Customer Experience
sponsored by DivvyCloud
WHITE PAPER: Today’s retailers are facing stress on several fronts: Customer demands for improved experience, competitive pressures, and the need to ensure regulatory compliance. This cloud security guide for retailers breaks down these common challenges and offers pragmatic advice for developing a roadmap for security and compliance.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

DivvyCloud

NIST Application Security Revisions You Need to Know
sponsored by Contrast Security
RESOURCE: NIST is a standard leader in the cybersecurity space that sets guidelines for organizations to follow across different areas of security. This landing page contains several useful resources focusing on the NIST revisions to their application security guidelines.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

Contrast Security

Protecting Against the 10 Most Critical Web Security Risks
sponsored by Progress Software Corporation Sitefinity
RESEARCH CONTENT: This infographic identifies the top 10 most critical security risks to web applications – as outlined by the Open Web Application Security Project (OWASP) – and explores tactics and advice for defending against each threat. Read on to get started.
Posted: 18 May 2020 | Published: 18 May 2020


Webinar - Defend Better and Respond Faster With Security That Works Together
sponsored by Cisco Umbrella
WEBCAST: Most malware infections happen in one of only 3 ways, so why aren’t they easier to stop? As organizations embrace the cloud, it’s now imperative to find a new approach to securing users and devices. View this webinar to find out how to stop attacks before they start and how to safeguard your organization with a layered approach to cybersecurity.
Posted: 31 Jul 2020 | Premiered: Jul 14, 2020

Cisco Umbrella

The Malicious Bot Playbook: Early Warning Signs, and What to Do About Them
sponsored by Cloudflare
WHITE PAPER: Similar to social engineering attacks, bot attacks are highly targeted to expose the vulnerabilities of a specific organization. Understanding the telltale bot warning signs has proven to be an effective measure at predicting and preventing attacks. This playbook outlines the common warning signs and tactics for addressing them.
Posted: 01 May 2020 | Published: 01 May 2020

Cloudflare

Cybersecurity and COVID-19: Securing Today’s Newly Distributed Workforce
sponsored by CrowdStrike
EBOOK: To play their part in ensuring the health and safety of their employees, organizations have quickly adopted a remote workforce model in order to maintain a semblance of ‘business as usual’. In this e-book, explore the security challenges organizations are seeing and discover how to embrace and secure a remote workforce.
Posted: 13 May 2020 | Published: 13 May 2020

CrowdStrike

Your CISSP Prep Guide
sponsored by TechTarget
RESOURCE: Obtaining a CISSP certification is globally recognized as a standard of achievement for security professionals. And whether you have already obtained your CISSP certification or are studying for the test, our CISSP prep guide can help you! To gain access to this guide, provide your valuable insight in our Endpoint Security Research Survey.
Posted: 22 Apr 2020 | Published: 30 Apr 2019

TechTarget

Data Privacy at Automox: Why SaaS Applications Deliver Superior Security
sponsored by Automox
WHITE PAPER: Cloud computing has seen a meteoric rise from emerging trend to backbone of most technology infrastructures. The growing list of benefits that come from a cloud transformation often overshadow the most common concern – security. In this white paper, learn more about the current cloud security landscape and where it’s expected to go.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info