Cross Site Scripting
By: Veracode, Inc. View more from Veracode, Inc. >>
Download this next:
Application security testing: Protecting your application and data
By: TechTarget Security
Type: eBook
Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book explains the basics of application security and how it differs from network security, and then delves deeper into testing for two common vulnerabilities: injection and cross-site scripting. It ends with a tip regarding performance concerns when adding security protection to code. The e-book is written for IT management, including QA and development managers, interested in ensuring their applications are kept secure.
These are also closely related to: "Cross Site Scripting"
-
Urban Myths About Secure Coding
By: Veracode, Inc.
Type: eBook
Urban myths, whether rooted in reality or fabricated entirely, have the power to change perception. Secure coding practices are not exempt from the danger of myths, as many misconceptions still plague the industry today.
This e-book is designed to rectify these misconceptions by presenting 6 common urban myths about secure coding and giving practical guidance for how to overcome them. Read the full e-book to learn about what myths may be holding you back from securing your code.
-
Application security: Understanding how software is protected
By: Veracode, Inc.
Type: Resource
According to a recent report, 76% of all software applications have some sort of a security flaw. Applications are often seen as products in and of themselves, but when they are given sensitive information, it is important that they also have the security means to defend themselves.
This infosheet looks at application security, going through and highlighting its importance, as well as the many different factors that play into it. Access the full infosheet to learn more about application security and what steps you can take to ensure the security of your software.
Find more content like what you just read:
-
Taking Action to Secure Web Applications
By: TechTarget Security
Type: eGuide
This expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.
-
Web-facing applications: Security assessment tools and strategies
By: TechTarget Security
Type: White Paper
Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected.
-
The State of Encrypted Attacks ThreatLabz Report
By: Zscaler
Type: Research Content
A vast majority of today's cyberattacks use encryption to bypass defenses. The Zscaler ThreatLabz team analyzed data from the world's largest security cloud to uncover what threats are hiding in SSL/TLS. Learn how the encrypted threat landscape has evolved and what you can do about it in the recent ThreatLabz report, The State of Encrypted Attacks.
-
FBI warns of global ATM cyber crime spree
By: TechTarget ComputerWeekly.com
Type: eGuide
The FBI has issued a warning to banks that cyber criminals are planning to steal millions in a coordinated worldwide attack on cash machines
-
Web-Facing Applications: Mitigating Likely Web Application Threats
By: TechTarget Security
Type: eGuide
In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.
-
E-Guide: Preventing and detecting security vulnerabilities in Web applications
By: TechTarget Security
Type: eGuide
The extent of fundamental security flaws in most applications often requires a re-architecture, but there are some secondary measures information security teams can take to safeguard faulty applications. This expert tip maps out the steps security professionals should take to lock down their Web applications.
-
E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits
By: TechTarget Security
Type: eGuide
Today’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering.
-
Application security: best practices and risks
By: TechTarget ComputerWeekly.com
Type: eGuide
Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
-
Even fintech startups battling to meet cyber security skills
By: TechTarget ComputerWeekly.com
Type: eGuide
A study shows that most fintech startups, like most banks, are failing to address vulnerabilities in the web and mobile applications, underlining the scale of the challenge
-
Web security: Important but often overlooked
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we take a look at the different approaches you can take in order to bolster your web security. We find out how to identify and address overlooked web security vulnerabilities, how security controls affect web security assessment results and why web opportunities must be met with appropriate security controls.
-
Web Application Firewalls: Patching, SDLC Key for Security, Compliance
By: TechTarget Security
Type: eGuide
In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.
-
AWS Lambda function URLs: The risks & how to address them
By: Contrast Security
Type: White Paper
This white paper covers the risks associated with using function URLs and how your organization should address them. Access it here.
-
Security leader’s guide to reducing risk in minutes
By: Security Journey
Type: White Paper
Cyberattacks are on the rise, and leading the vanguard of this influx are injection vulnerabilities and other attacks that prey on weak code security practices. This white paper outlines the critical need of secure coding training, analyzing the means to implementing programs. Download the white paper now to learn more.
-
Protect your digital footprint from the new wave of risk
By: F5 Networks, Inc.
Type: eBook
The Open Web Application Security Project (OWASP) top 10 list aims to raise awareness of leading software security risks. This e-book is designed to help you implement the findings of the OWASP top 10 list by looking at each of the top threats and giving you actions and strategies you can use to combat them. Read on to learn more.
-
e-Guide: Evolving IT security threats: Inside Web-based, social engineering attacks
By: TechTarget Security
Type: eGuide
Defending IT infrastructure involves understanding attack methods that are effective today. This expert e-guide highlights several characteristics of modern computer security threats to keep in mind as you assess and improve your information security program, and provides recommendations for dealing with them.
-
Computer Weekly – 4 July 2017: Be better connected in a wireless world
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look at the latest developments in wireless technology and how to deliver secure and reliable wireless networks. We examine Microsoft's PowerShell scripting language to understand why it's such an important tool. And we ask CIOs what it's like to cross the divide and work for IT suppliers. Read the issue now.
-
Automating routine IT tasks smartly
By: TechTarget ComputerWeekly.com
Type: eGuide
From simple scripts to programmable infrastructure, automation saves IT admins a huge amount of time repeating tasks. Additionally, machine learning be used to understand normal application behaviour and take actions automatically if things are out of kilter. But sometimes a simpler approach is all that is needed.
-
SAST vs. DAST: What Are the Differences and Why Are They Both Important?
By: Veracode, Inc.
Type: Resource
If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.
-
How Do Vulnerabilities Get into Software?
By: Veracode, Inc.
Type: White Paper
Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
-
An introduction to web application firewalls (WAFs)
By: F5 Inc.
Type: eBook
The complex deployments utilized by modern web applications are inherently difficult to protect. This Web Application Firewalls (WAFs) For Dummies e-book explores how WAFs can help overcome these complexities and provide a stable defense for web applications. Read on to learn more.
-
E-Guide: How to Combat the Latest Cybersecurity Threats
By: TechTarget Security
Type: eGuide
It takes a great deal of time and money to fine-tune IT security in response to evolving IT security threats and attack tactics. This expert e-guide provides an in-depth overview of modern computer security threats and offers technical advice on how to deal with them.
-
DevSecOps: A comprehensive guide
By: Contrast Security
Type: eGuide
Read this DevSecOps Buyer’s Guide and get the comprehensive checklist you need to assess, vet, and purchase a DevSecOps platform that delivers accurate, continuous, and integrated security monitoring and remediation.
-
A Computer Weekly buyer's guide to secure and agile app development
By: TechTarget ComputerWeekly.com
Type: eGuide
As apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding
-
Build a better webinar: Storytelling & scripting
By: BrightTALK by TechTarget
Type: BrightTALK Webinar
The best webinars tell a clear and concise story that captures an audience’s attention. You may be a seasoned presenter, but do you use the elements of good story telling to connect emotionally with your audience? Watch this webinar to learn more.
-
Exchange Insider E-Zine Vol. 14: Securing Mobile Devices and Exchange
By: TechTarget Security
Type: Ezine
This essential e-zine reviews key BYOD concerns and considerations for Exchange admins, and offers tips for addressing the technical logistics of delivering secure email access to mobile devices. Learn how to leverage PowerShell scripts, ActiveSync data, and more.
-
Build a better webinar: Crafting talking points
By: BrightTALK by TechTarget
Type: BrightTALK Webinar
Clear and succinct communication is an art, especially when it comes to live webinars. You may be an expert in your field, but do you present your content in a way your audience can actually understand? Watch this webinar to learn more.
-
DevSecOps delivers better business
By: TechTarget ComputerWeekly.com
Type: eGuide
Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.
-
Toughening up web and mobile application security
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.
-
CW ASEAN, November 2018: Blockchain is no 'magic wand' for security
By: TechTarget ComputerWeekly.com
Type: Ezine
Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.
-
OWASP Top Ten: How to keep up
By: Contrast Security
Type: eBook
The newest addition to the OWASP Top Ten was recently published to help organizations assess their application security efforts – but false positives could lead to unnecessary stress. Download now to learn how Contrast’s observability platforms is designed to keep up with the rapidly expanding scope of the OWASP Top Ten.
-
Guide to the dangers of third-party threats
By: Ionix
Type: White Paper
Modern applications are overly reliant on third-party services and content. As a result, security compromises resulting from third-party vulnerabilities have seen a marked increase. Download this white paper to unlock an in-depth look at how you can use an attack surface management (ASM) solution to protect your applications.
-
Protect Against the OWASP Top 10
By: F5 Inc.
Type: eBook
Hackers specialize in taking advantage of organizations’ blind spots, and with digital business taking organizations into areas of limited visibility, these blind spots are only becoming more frequent. The OWASP Top 10 represents a broad consensus on the most critical security risks to web applications. Download this eBook to learn more.
-
Beating web application security threats
By: TechTarget Security
Type: eGuide
Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability.
-
The state of penetration risk
By: Coalfire
Type: Research Content
By studying new attacks, and analyzing adversarial behavior, organizations can better track and understand attackers, their goals and their tactics. Download this report on the state of penetration risk to unlock statistics and information that you can use to develop a threat-informed cybersecurity strategy for your organization.
-
Technical Guide on Emerging Threats
By: TechTarget Security
Type: eGuide
It takes time and money to adjust IT security in response to evolving attack tactics. As defenders gradually update their security measures, attackers respond accordingly. Such arms-race dynamics lead to threats of increasing sophistication and efficiency.
-
Healthcare Organizations: Actionable Cybersecurity Insights
By: Trustwave
Type: Research Content
In 2022, over 28.5 million healthcare records were breached, according to The U.S. Department of Health and Human Services. So, how can today’s healthcare organizations protect their records and defend against advanced threats? To unlock actionable insights, dig into this 46-page report.
-
The Ultimate Guide to Ransomware and Cybersecurity Planning
By: Infinidat
Type: eGuide
Read through this comprehensive e-guide for everything you need to know about cybersecurity planning for ransomware: types of attacks, common attack vectors, prevention methods and tools, best practices for recovery, and more.
-
How to orchestrate cross-domain workflows with ease
By: Orchestral.ai
Type: Video
To learn how to flip the script on infrastructure complexity, avoid costly outages, orchestrate cross-domain workflows with ease, and automatically connect your various tools, APIs, and services together under one platform, tune into this video to evaluate one option: Composer by Orchestral.ai.
-
Expert Guide to web 2.0 Threats: How to Prevent an Attack
By: TechTarget Security
Type: eGuide
A majority of today’s organizations already leverage the benefits of Web 2.0 technologies, or at least wonder how they can take advantage of it. This expert e-guide provides an overview of what Web 2.0 really is and explains how to combat the myriad of threats that accompany this convenient technology.
-
The ever-increasing necessity: File upload security
By: Deep Instinct
Type: White Paper
Organizations accept files through their web applications to run their business. But, files being uploaded by customers could contain malware or some other risk that could hurt your business. What is scarier is that 80% of successful breaches come from zero-day attacks. Read on to learn more and don’t let malicious files stay like uninvited guests.
-
The Monsters in Your Software Supply Chain
By: ReversingLabs
Type: White Paper
Software supply chain attacks are up over 1000%. Are you prepared to confront the monsters that hackers are setting loose in your software supply chain? Download the new white paper to help arm yourself with knowledge and the tools to stay ahead of the modern software attack.
-
Your path to a mature AppSec program
By: Veracode, Inc.
Type: eBook
Due to the sensitive data they contain, applications are often the target of cyberattacks – and unfortunately, application security approaches are rarely equipped to handle today’s threats. Read this e-book to learn how to modernize your application security approach.
-
Expel’s comprehensive 2024 threat report: Predictions & insights
By: Expel
Type: Research Content
Expel’s operators do a massive amount of analysis, triage, and complicated problem-solving—stopping intricate attacks every single day. That makes their observations exemplary of the true state of cybersecurity and its related threats. Download this report to explore all the key findings you can use to optimize your cybersecurity strategy in 2024.
-
9 IpaaS use cases for the enterprise
By: TechTarget ComputerWeekly.com
Type: eGuide
iPaaS has gained significant traction in recent years to provide a common foundation for many complex and diverse business integrations. IPaaS provides an array of readily available integrations with tools for users to assemble custom integrations and data flows. Here are 9 examples to help you understand how it all works.
-
eGuide: Expert Tips for Deploying Secure Messaging Technologies
By: TechTarget Security
Type: White Paper
This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
-
Application security: More important than ever
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
-
Understanding the origins of the security skills shortage
By: Security Journey
Type: Analyst Report
The security skills shortage has hindered organizations’ abilities to build secure programs. This report presents the findings of a study EMA conducted with 129 professionals across multiple industry verticals, seeking to understand how organizations are tackling the difficult challenge of developing secure software. Read on to learn more.