You've requested...

Share this with your colleagues:

Download this next:

5 most common application security incidents

This report was designed to uncover new areas of risk in application security, and confirm the presence of threats, vulnerabilities, and security incidents that teams have previously only suspected.

Download the report to explore the top 5 most common application security incidents including:

  • Cross-site scripting
  • SQL injections
  • Automated threats
  • And more

These are also closely related to: "Cross Site Scripting"

  • Application security testing: Protecting your application and data

    Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book explains the basics of application security and how it differs from network security, and then delves deeper into testing for two common vulnerabilities: injection and cross-site scripting. It ends with a tip regarding performance concerns when adding security protection to code. The e-book is written for IT management, including QA and development managers, interested in ensuring their applications are kept secure.

  • Gain control over your web traffic & mitigate application attacks

    For most organizations, protecting web applications from attacks is critical to prevent compromises that could ultimately take down those applications as well as expose sensitive data to hackers.

    Web application firewalls (WAF) sit in-between users across the internet and your applications, inspecting back-and-forth traffic for potential threats and indicators of compromise (IOC).

    In this resource, learn about the Armor monitored WAF and how it gives you control over which traffic to allow or block to your web applications by defining customizable web security rules to stop OWASP Top 10 application attacks including SQL injections (SQLi), XML external entity (XXE) attacks, and cross-site scripting (XSS) attacks.

Find more content like what you just read:

  • Developer's guide to OWASP

    Download this guide to learn how developers can enhance their secure coding skills and reduce application security risks by focusing on the OWASP top 10.

    Download

  • Preparing for the new OWASP: Top 10 and beyond

    Web app security is difficult and firewalls are not going to be enough. OSWAP has released a list of the 10 most common security concerns you need to address for your web apps. Access this e-book to learn about each of these 10 key web app security concerns and how you can mitigate them.

    Download

  • State of Software Security

    Veracode analyzed more than 700,000 application scans, representing more than 2 trillion lines of code. Access this paper for a snapshot of what the data shows about the state of software security today.

    Download

  • Taking Action to Secure Web Applications

    This expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.

    Download

  • Secure coding best practices for developers

    Access this whitepaper to learn some of the best steps you can take today to have more secure coding practices, and the many risks you'll be able to address.

    Download

  • What can a security shift left do for you?

    Security can become a massive roadblock at the end of a development sprint, so you need to think about shifting it left in your DevOps process. What can a security shift left accomplish for you? Learn about all of the benefits in this whitepaper, and learn how to begin moving your security process today.

    Download

  • Application security: Understanding its current state

    This application security statistics report provides an analysis of the state of application security, brings to the forefront evolutionary trends, and highlights best practices that result in better application security over time. The report also presents challenges and opportunities to secure the applications.

    Download

  • Prevent automated threats with the right application security strategy

    New methods are needed to effectively automate the mitigation of fast-evolving threats. Read this white paper to learn about application security strategies that focus on preventing automated threats, which can help you make operational improvements, and lower operating costs.

    Download

  • Web-Facing Applications: Mitigating Likely Web Application Threats

    In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.

    Download

  • Remote code execution and application security vulnerabilities

    Join Mark Rogan, DAST Manager from the WhiteHat Security Threat Research Center, as he discusses the top vulnerabilities and gives valuable prevention tips for enterprises to implement.

    Download

  • Web-facing applications: Security assessment tools and strategies

    Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected.

    Download

  • A guide to adapting security to the changing world of DevSecOps

    Discover a guide for adapting security to the changing world of DevSecOps. Read on to learn 5 Steps to modernize security in the DevSecOps era today.

    Download

  • E-Guide: Preventing and detecting security vulnerabilities in Web applications

    The extent of fundamental security flaws in most applications often requires a re-architecture, but there are some secondary measures information security teams can take to safeguard faulty applications. This expert tip maps out the steps security professionals should take to lock down their Web applications.

    Download

  • E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits

    Today’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering.

    Download

  • 5 things you need to know about a Web Application Firewall

    Web Application Firewall (WAF) is a priority item for IT professionals who are struggling to protect their customer-facing and mission-critical applications. WAFs detect and protect web applications from attacks that try to exploit vulnerabilities. In this white paper, learn 5 things you need to know before buying a WAF.

    Download

  • Web Application Firewalls: Patching, SDLC Key for Security, Compliance

    In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.

    Download

  • How to implement a successful application security program

    Network security is everywhere and we have all been hyperaware of securing the perimeter and having our firewalls on high alert. Now, application vulnerabilities are being exploited and it's time to do something about it. In this best practices guide, learn the steps to take towards implementing a successful application security program.

    Download

  • The state of application security: A 2018 report

    Find out the state of application security in 2018 in this insightful research report from the Software Security Research team at Micro Focus Fortify.

    Download

  • How to deal with website performance issues from 3rd-party tags

    Digital businesses are innovating quickly to meet customer expectations and competitive pressures. To do so, they often use 3rd-party tags and scripts to add functionality to their websites. In this e-book, explore hidden issues of using 3rd-party tags, and how to address them to help ensure your users don't experience major performance issues.

    Download

  • Securing Web Applications

    Attacks on web applications can circumvent your security and harm your business in myriad ways by creating unwanted downtime, reducing availability and responsiveness, and shattering trust with your customers when data confidentiality and integrity is compromised.

    Download

  • e-Guide: Evolving IT security threats: Inside Web-based, social engineering attacks

    Defending IT infrastructure involves understanding attack methods that are effective today. This expert e-guide highlights several characteristics of modern computer security threats to keep in mind as you assess and improve your information security program, and provides recommendations for dealing with them.

    Download

  • Get superior protection against credential theft and abuse

    Download this white paper to learn about F5's Advanced WAF that is designed to offer superior protections against the latest credential threat and abuse.

    Download

  • E-Guide: How to Combat the Latest Cybersecurity Threats

    It takes a great deal of time and money to fine-tune IT security in response to evolving IT security threats and attack tactics. This expert e-guide provides an in-depth overview of modern computer security threats and offers technical advice on how to deal with them.

    Download

  • Computer Weekly – 4 July 2017: Be better connected in a wireless world

    In this week's Computer Weekly, we look at the latest developments in wireless technology and how to deliver secure and reliable wireless networks. We examine Microsoft's PowerShell scripting language to understand why it's such an important tool. And we ask CIOs what it's like to cross the divide and work for IT suppliers. Read the issue now.

    Download

  • Smart cards: security risks

    This article in our Royal Holloway Information Security Thesis series assess the new features introduced in Java Card 3 Connected Edition smart card specification and their associated security risks.

    Download

  • DevSecOps best practices: A road map to enhanced security

    Download this e-book to learn how to extend the benefits of DevOps to security and how to embrace and implement modern DevSecOps principles, practices, and tooling.

    Download

  • Malware attacks in smart buildings – Research results

    In this white paper, discover an investigation of the current state of cybersecurity in building automation systems (BAS) and analysis of a proof-of-concept malware created by Forescout's OT research team.

    Download

  • How to transform network traffic into data for your security team

    Learn how this top research university was able to meet all of their network traffic analysis requirements with fast network log searches, expanded custom detection scripting capabilities, and more.

    Download

  • How to find and mitigate open source security risks

    In a survey by Black Duck Audit Services in 2018, 60% of codebases contained at least one open source vulnerability. Open these survey results to learn where open source vulnerabilities are most likely lurking, and best practices for mitigating open source security risks.

    Download

  • DevSecOps delivers better business

    Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.

    Download

  • Choosing the right mobile app security testing option

    Download this solution brief to compare several offerings from a suite of mobile app security testing options that utilize a combination of dynamic and static automated scanning.

    Download

  • Security for the PCI compliant environment

    This white paper examines the applicability of Trend Micro's Hybrid Cloud Security Solution, specifically Trend Micro Deep Security, to secure Payment Card Industry (PCI) data in accordance with the PCI DSS when used in physical, virtual, cloud, or container environments.

    Download

  • How improved SAST can help dev teams ensure app security

    Download this white paper to learn how a static application security testing (SAST) tool, can help your teams ensure that app code is secure – from development to pre-production – through effective scanning and remediation of vulnerabilities.

    Download

  • Exchange Insider E-Zine Vol. 14: Securing Mobile Devices and Exchange

    This essential e-zine reviews key BYOD concerns and considerations for Exchange admins, and offers tips for addressing the technical logistics of delivering secure email access to mobile devices. Learn how to leverage PowerShell scripts, ActiveSync data, and more.

    Download

  • 4 major cyberattack methods and how to defend against them

    The question is not whether you will be attacked. It's when, by what, and how badly your company's reputation or finances will be damaged. In the world of cybersecurity the wrong time to consider defense is after the attack has occurred. In this white paper, learn about different attack methods and how to protect your company.

    Download

  • Technical Guide on Emerging Threats

    It takes time and money to adjust IT security in response to evolving attack tactics. As defenders gradually update their security measures, attackers respond accordingly. Such arms-race dynamics lead to threats of increasing sophistication and efficiency.

    Download

  • Learn how PowerShell is being leveraged by cyberattackers

    While intended for system administration and the automation of daily maintenance and management tasks, PowerShell has become a preferred tool for cybercriminals. In this white paper, learn more about how PowerShell is being leveraged by cyberattackers and how enSilo can protect your endpoints against this increasing threat.

    Download

  • How does cloud automation affect DBAs?

    For DBAs, job security can become a serious concern as automation and autonomous scripting become more and more prevalent and drastically reduce the necessity for manual input or management. Watch this webcast to better understand how you can prepare yourself for the changes that the DBA role will face under coming waves of digital transformation.

    Download

  • Teaching coders how to integrate security into your application lifecycle

    84% of security breaches exploit vulnerabilities at the application layer. And, software security is still an afterthought for developers. In this white paper, discover how Fortify Security Assistant empowers developers to take responsibility for their own code by finding and fixing application security defects during the coding process.

    Download

  • How to secure source code for all your apps, not just the critical ones

    App vulnerabilities originate with the source code, and you'll want to secure more of your source code in both development and production. But it's easier said than done for security pros to review source code continuously. Uncover a new static application security testing subscription service to address this problem.

    Download

  • Why attackers are targeting your web apps

    Dive into this 11-page Frost & Sullivan Report to learn why web applications are under attack, the costs associated with an attack and how you can revamp your current web application firewall strategy to continue your business engagements with confidence.

    Download

  • Beating web application security threats

    Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability.

    Download

  • 2019 Hacker Report: Discover key findings

    Many hackers are finding career building opportunities through bug bounties, with companies hiring from within the hacker community at a faster clip than ever before. As hacking grows in popularity, training continues to be a focus. Download this research report that details more than 300,000 individuals who represent the hacker community today.

    Download

  • Expert Guide to web 2.0 Threats: How to Prevent an Attack

    A majority of today’s organizations already leverage the benefits of Web 2.0 technologies, or at least wonder how they can take advantage of it. This expert e-guide provides an overview of what Web 2.0 really is and explains how to combat the myriad of threats that accompany this convenient technology.

    Download

  • eGuide: Expert Tips for Deploying Secure Messaging Technologies

    This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.

    Download

  • App security: Mitigate threats and lower risk across the cloud

    Download this white paper to learn about security tools that operate in any cloud environment, and help you know what makes your apps vulnerable and how they can be attacked, so you can mitigate threats and lower your risk.

    Download

  • CW+: Analyst's take: Cyber-Ark benefits privileged account management

    Managing privileged accounts requires balancing accessibility and control while ensuring audit capabilities.  Cyber-Ark enables organizations to increase administrator productivity while reducing risk.

    Download