ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • Interview with Fraud Strategy Leader

    Sponsored by: Mitek Systems, Inc.

    In this Q and A, the fraud strategy leader at a mobile-only banking app sits down with the customer success leader at Mitek to talk about why customer experience is critical to business success and the vital role it plays in identity verification.

  • How to Safeguard Against Cross-Site Scripting (XSS) Attacks

    Sponsored by: Tala Security

    Cross-site scripting (XSS) attacks are a rising concern for all industries and will continue to be a favored strategy for cybercriminals. With a proactive and strategic approach, your organization can ensure web application security. Read on to learn more.

  • 2019–2020 Global Application & Network Security Report

    Sponsored by: Radware

    To provide insight into the complex challenges faced by organizations as they seek to balance business agility and security requirements, Radware produced a Global Application & Network Security Report. Download the report to explore real attack data, analyses of developing trends and technologies, and findings from a global industry survey.

  • Cisco Umbrella & Duo Security: Protect users and secure access to applications

    Sponsored by: Cisco Umbrella

    As remote workstations and BYOD devices continue to rise in popularity, traditional perimeter security tactics need to me revised with focus on the network and applications. In this data sheet, discover how Cisco Umbrella and Duo Security solutions work together to achieve secure access to any device.

  • Closing the Website Security Gap: Why a WAF Is Not Enough

    Sponsored by: Tala Security

    Although web application firewalls (WAFs) have a come a long way in recent years, they remain ineffective as a standalone security solution against Magecart cyberattacks. This white paper underlines the shortcomings of WAFs and highlights the importance of protecting the browser-side and the client-side from threats.

  • Alert Logic: SIEMless Threat Management

    Sponsored by: Alert Logic

    Ensuring security for AWS applications requires resource-intensive visibility and monitoring, which may be too costly for some users. This checklist highlights the key considerations for self-assessing your program to help guide you towards a more secure AWS application environment.

  • Unbreakable API: Best Practices for AppSec Testing

    Sponsored by: WhiteHat Security

    Modern API development is creating more and more entry points in an application’s architecture for cyberattacks. In this WhiteHat webinar, chief scientist Eric Sheridan goes through some best practices for APIs, including industry perspectives, AppSec breakdowns, and more. Get up to date with your API security strategy. Watch the webinar now.

  • Javascript vs Javascript: Performance Penalty of Api Hooking

    Sponsored by: Tala Security

    While it’s intuitive that defending your code is an important practice, there are times when that defense comes at a high cost.In this white paper, get an overview of the performance penalties associated with hooking browser JavaScript APIs to defend against JavaScript based threats.

  • The State of Security Segmentation

    Sponsored by: Illumio

    As cyberattacks grow increasingly common, it’s critical to look at how criminals operate in order to prevent damage. Read on to uncover the research findings of a recent study designed to shed light on the current state of security segmentation, and why it’s preferable compared to traditional firewalls.

  • Best Practices for Office 365 Security Monitoring

    Sponsored by: AT&T Cybersecurity

    In order to realize the full benefits of Office 365 cloud applications, establishing an appropriate cloud security strategy is essential. As with any new technology, there are valid security concerns to consider before making the switch. In this white paper, discover the security monitoring best practices for Office 365.

  • 2018 Global Study on Application Security

    Sponsored by: Arxan

    Ponemon Institute conducted a survey to understand the risk that unprotected applications pose to businesses when running in unsecured environments and how organizations are addressing this risk in practice. In this research report, learn about key findings from the survey.

  • State of the Internet: Financial Services Attack Economy

    Sponsored by: Akamai Technologies

    The financial service industry faces a wide area of cybersecurity threats, including password problems, phishing, mobile application attacks, and more. Being aware of the most current attack trends can be critical for the security of sensitive data. This research report breaks down the specific challenges and threats within the industry.

  • Beyond SD-WAN: Zero Trust Security and the Internet as Corporate WAN

    Sponsored by: Akamai Technologies

    Read this white paper to learn why Internet is the corporate WAN of the near future, and how enabling safe traffic to go straight to the Internet, blocking bad traffic, and only proxying risky traffic, delivers simplified security, lower latency and better performance, fewer broken web pages and applications.

  • Intelligent Security Starts at the Edge

    Sponsored by: Akamai Technologies

    In Gartner’s most recent Magic Quadrant installment for Web Application Firewalls (WAF), they named Akamai a Leader for the third year in a row. This white paper provides an overview of the benefits of WAF, and highlights Akamai’s approach to WAF. Read on to get started.

  • Preventing Unknown, Zero-Day Attacks

    Sponsored by: Checkpoint Software Technologies

    The increasing reliance of mobile devices to conduct business operations organizations vulnerable to hackers who would look to expose these weaknesses. In this solution brief, learn more about the benefits and features of Check Point SandBlast Mobile and discover how it compares to similar industry offerings.

  • WhiteHat Software Composition Analysis

    Sponsored by: WhiteHat Security

    Leveraging 3rd party code is dangerous due to the unknown security risks – this makes software composition analysis an essential practice for all open source users. Open this open source briefing to review whether you should consider implementing a software composition analysis tool to safeguard your open source reliance.

  • WhiteHat eLearning Computer-Based Training

    Sponsored by: WhiteHat Security

    Leveraging online developer trainings are a quick and effective way to resolve your security centric development hurdles. Download this whitepaper for an overview of 4 security training paths designed to enhance developer security practices.

  • 2019 Application Security Statistics Report: The DevSecOps Approach

    Sponsored by: WhiteHat Security

    Despite the growing emphasis IT teams place on application security, too many enterprises still fall prone to risks as a result of legacy procedures, lack of coordination, and negligence. Download this application security report for a wide range of takeaways from survey IT teams, and 4 recommendations to leverage in your own DevSecOps.

  • Accelerate Innovation with Automated Security

    Sponsored by: Sonatype

    The convenience of open source software for developers is unmatched. However, it’s critical to consider the vulnerabilities of open source software when developing security policies. In this white paper, go in-depth into the Nexus Platform for protecting your organization’s software development lifecycle.

  • Application Shielding First Line of Defense for Financial Apps

    Sponsored by: Intertrust

    In this webinar, join Paul Butterworth, the Director of Product Marketing at Intertrust, as he discusses the risks your financial applications face, best practices for protecting applications, IP and keys and explore some real-world examples from financial services.

  • Application Shielding with Intertrust whiteCriterion Code Protection

    Sponsored by: Intertrust

    Traditional parameter security measures lack the flexibility needed to meet mobile and IoT security risks. This white paper goes in-depth into the specific security challenges hackers are using to expose application vulnerabilities and defines the tactics and tools that can be implemented to mitigate these risks.

  • Gentek Global Secures Payment Systems with Application Shielding

    Sponsored by: Intertrust

    In this case study, discover how Gentek, a payment systems security company, partnered with Intertrust to deploy robust application shielding for its payment systems in order to protect user data and adhere to regulatory requirements of the payments industry.

  • Taking Steps to Protect Financial Mobile Applications

    Sponsored by: Intertrust

    Although the popularity of mobile applications has greatly simplified the use of day-to-day financial operations for the end user, it has created additional workload for ensuring their security. In this white paper, take an in-depth look into the world of financial mobile applications and learn practical ways to ensure protection.

  • Reverse Engineering Still a Serious Problem in 2019

    Sponsored by: Intertrust

    While mobile applications and interconnected devices offer unmatched convenience, they also expose organizations and consumers to cybersecurity risks. This webinar breaks down common mobile application security threats and highlights real-life reverse engineering examples.

  • Preventing PeopleSoft Breaches

    Sponsored by: Appsian

    Due to the ever-evolving threat landscape, organizations are facing data breaches from both outside and within the perimeter. As a result, IT security teams need to rethink their traditional security strategies, which focus primarily on the perimeter, and shift towards application and credential-level security. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.