ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • Taking Steps to Protect Financial Mobile Applications

    Sponsored by: Intertrust

    Although the popularity of mobile applications has greatly simplified the use of day-to-day financial operations for the end user, it has created additional workload for ensuring their security. In this white paper, take an in-depth look into the world of financial mobile applications and learn practical ways to ensure protection.

  • Reverse Engineering Still a Serious Problem in 2019

    Sponsored by: Intertrust

    While mobile applications and interconnected devices offer unmatched convenience, they also expose organizations and consumers to cybersecurity risks. This webinar breaks down common mobile application security threats and highlights real-life reverse engineering examples.

  • Preventing PeopleSoft Breaches

    Sponsored by: Appsian

    Due to the ever-evolving threat landscape, organizations are facing data breaches from both outside and within the perimeter. As a result, IT security teams need to rethink their traditional security strategies, which focus primarily on the perimeter, and shift towards application and credential-level security. Read on to learn more.

  • Okta Identity Management for Portals Built on Salesforce.com

    Sponsored by: Okta

    Identity and access management services enable organizations to automate portal management needs using single sign-on to eliminate separation while maintaining control. This white paper highlights the potential benefit incorporating Okta’s platform in order to build a simplified, synchronized web portal.

  • Identity Layer for Web and Mobile Applications

    Sponsored by: Okta

    This data sheet provides an overview of the Okta’s Identity Platform: a series of services designed to address identity and access security concerns and help you launch your business applications. Read on to learn more.

  • The New Era of Fraud: A Bot-Driven Threat

    Sponsored by: F5 Networks

    With most attacks happening at the app level, protecting the capabilities that drive your business means protecting the apps that make them happen. This article highlights the many faces of fraud and some of the common tactics used to detect and prevent attacks. Read on to learn more.

  • Pitney Bowes - Okta + F5 joint case study

    Sponsored by: Okta

    In this case study, uncover how Pitney Bowes partnered with Okta and F5 Networks to achieve greater scale, security and reliability for the over 2.8 million users within their cloud-based global e-commerce platform.

  • Consumer Identity Management for the CMO, CISO, and CIO

    Sponsored by: Okta

    As customer demands shifting towards mobile device functionality, consumer IAM (CIAM) becomes a critical security consideration for business leaders.In this article, discover how CIAM can be a strategic asset for businesses and uncover the specific requirements of identity management for CMOs, CISOs and CIOs.

  • API Security for Dummies

    Sponsored by: Data Theorem

    API Security for Dummies is a high-level introduction to the key concepts of API security and DevSecOps. Download now for an in-depth overview of the growth of the API economy, API security challenges (how to address them), and automation protection with DevSecOps.

  • Build vs. Buy

    Sponsored by: Okta

    IT teams have increasingly turned to pre-built tools to offload some of the burden of application development. Customer identity and access management (CIAM) presents developers with a broad range of challenges that a trusted identity layer can help offload easily. Read on to explore the challenges and benefits of CIAM.

  • The Next Wave of Bot-Driven Brute Force Attacks

    Sponsored by: F5 Networks

    With most cyberattacks targeting critical business applications, protecting the capabilities that drive your business means protecting the apps that make them happen. In this e-book, explore the next generation of bot attacks and uncover best-practices for stopping credential theft.

  • Okta + MuleSoft: Comprehensive API Access Control and Management

    Sponsored by: Okta

    As the most valuable APIs often contain sensitive data, the consequences of getting API security wrong can be significant. It’s critical to implement a solution that enables secure management and access control to your APIs. Read on to learn how Okta and MuleSoft deliver comprehensive API access control and management.

  • Evolve your Security Operations Center

    Sponsored by: Optiv

    Digital transformation has revolutionized the way business is conducted. However, cybersecurity hasn’t kept pace with technology changes and trends. Evolving your SOC will help your organization better analyze, plan, build, run and measure. Continue to this video to get started.

  • Assess Secure Web Gateways to Suit Your Network Security Needs

    Sponsored by: SearchSecurity.com

    Secure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.

  • Secure Cloud Transformation

    Sponsored by: Menlo Security

    As a result of the increasing popularity of SaaS tools and applications, organizations are rethinking their infrastructure to include security without sacrificing user experience. In this white paper, take an in-depth look into strategic principles IT leaders are incorporating, and explore Menlo Security’s Cloud Platform.

  • Is the Cloud Transforming Security?

    Sponsored by: Menlo Security

    As IT teams continue to prioritize cloud transformation, it’s imperative to also reconsider security tactics in order to realize the full benefits of cloud services.In this webinar, leverage industry expertise around cloud transformation, security implications, and explore the benefits of isolation tactics.

  • A Computer Weekly buyer's guide to next-generation programming tools

    Sponsored by: ComputerWeekly.com

    All kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.

  • Take Care When Fighting Mobile Commerce Fraud

    Sponsored by: LexisNexis® Risk Solutions

    Can you strengthen your defense without making a mess of customer experience? As cybercriminals are getting more sophisticated with their attacks, retailers of all sizes are asking themselves this question. In this white paper, explore what to consider when refining your mobile security strategy.

  • Mobile Commerce Fraud: A Rising Threat to Retailers

    Sponsored by: LexisNexis® Risk Solutions

    Retailers newer to the mobile channel say that fraud attempts have increased in the past year. Read this white paper explore mobile retail commerce and the factors that contribute to fraud.

  • The Top Automated Bot Threats and How to Stop Them

    Sponsored by: Radware

    Global bot traffic is escalating and intensifying, and malicious bots can now mimic human behavior to scrape data, take over accounts and commit payment fraud. Staying ahead of these threats is important and thus requires security capabilities to detect and stop them. Learn more now.

  • Get Your App Ready for the Global B2B Market

    Sponsored by: Okta

    To foster a healthy relationship with enterprise partners and customers, you need to allow those users to use their existing enterprise identities to access your applications or shared resources. In this white paper, learn about 4 ways to integrate your enterprise applications and internal systems with your partners and customers’ identities.

  • Consumer Data Right: Open Banking

    Sponsored by: Ping Identity Corporation

    With consumers growing increasingly reliant on digital services and interfaces, the financial industry is evolving to meet these expectations through open banking interfaces. In this solution brief, explore the Ping Identity Platform, designed to meet Australia’s Open Banking requirements while still providing a seamless user experience.

  • Discover Hidden API Security Vulnerabilities and How to Defend Against Them

    Sponsored by: Ping Identity Corporation

    Already an attractive target for bad actors, APIs are predicted to soon become the top attack vector. And while APIs may hold the key to compliance with regulations like GDPR, PSD2 and CDR, they also expose potential vulnerabilities. Read this white paper to gain a deeper visibility into your API activity today.

  • Asia-Pacific Cloud Security Study

    Sponsored by: Palo Alto Networks

    A recently released study by Palo Alto Networks uncovers the truth about the state of cloud security among large enterprises across Asia-Pacific, including many cases where perception doesn’t match the reality of professionals who know best. Download the report to dive deeper into the research.

  • How to Lock Down Git

    Sponsored by: Perforce

    While Git allows for developers to collaborate, it can also contribute to loss of intellectual property & significant security issues. This white paper covers tactics designed to mitigate the risks of Git & discusses best practices for securing native Git. Download this report to get started.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.