Application Security Research
-
Taking Steps to Protect Financial Mobile Applications
Sponsored by: IntertrustAlthough the popularity of mobile applications has greatly simplified the use of day-to-day financial operations for the end user, it has created additional workload for ensuring their security. In this white paper, take an in-depth look into the world of financial mobile applications and learn practical ways to ensure protection.
-
Reverse Engineering Still a Serious Problem in 2019
Sponsored by: IntertrustWhile mobile applications and interconnected devices offer unmatched convenience, they also expose organizations and consumers to cybersecurity risks. This webinar breaks down common mobile application security threats and highlights real-life reverse engineering examples.
-
Preventing PeopleSoft Breaches
Sponsored by: AppsianDue to the ever-evolving threat landscape, organizations are facing data breaches from both outside and within the perimeter. As a result, IT security teams need to rethink their traditional security strategies, which focus primarily on the perimeter, and shift towards application and credential-level security. Read on to learn more.
-
Okta Identity Management for Portals Built on Salesforce.com
Sponsored by: OktaIdentity and access management services enable organizations to automate portal management needs using single sign-on to eliminate separation while maintaining control. This white paper highlights the potential benefit incorporating Okta’s platform in order to build a simplified, synchronized web portal.
-
Identity Layer for Web and Mobile Applications
Sponsored by: OktaThis data sheet provides an overview of the Okta’s Identity Platform: a series of services designed to address identity and access security concerns and help you launch your business applications. Read on to learn more.
-
The New Era of Fraud: A Bot-Driven Threat
Sponsored by: F5 NetworksWith most attacks happening at the app level, protecting the capabilities that drive your business means protecting the apps that make them happen. This article highlights the many faces of fraud and some of the common tactics used to detect and prevent attacks. Read on to learn more.
-
Pitney Bowes - Okta + F5 joint case study
Sponsored by: OktaIn this case study, uncover how Pitney Bowes partnered with Okta and F5 Networks to achieve greater scale, security and reliability for the over 2.8 million users within their cloud-based global e-commerce platform.
-
Consumer Identity Management for the CMO, CISO, and CIO
Sponsored by: OktaAs customer demands shifting towards mobile device functionality, consumer IAM (CIAM) becomes a critical security consideration for business leaders.In this article, discover how CIAM can be a strategic asset for businesses and uncover the specific requirements of identity management for CMOs, CISOs and CIOs.
-
API Security for Dummies
Sponsored by: Data TheoremAPI Security for Dummies is a high-level introduction to the key concepts of API security and DevSecOps. Download now for an in-depth overview of the growth of the API economy, API security challenges (how to address them), and automation protection with DevSecOps.
-
Build vs. Buy
Sponsored by: OktaIT teams have increasingly turned to pre-built tools to offload some of the burden of application development. Customer identity and access management (CIAM) presents developers with a broad range of challenges that a trusted identity layer can help offload easily. Read on to explore the challenges and benefits of CIAM.
-
The Next Wave of Bot-Driven Brute Force Attacks
Sponsored by: F5 NetworksWith most cyberattacks targeting critical business applications, protecting the capabilities that drive your business means protecting the apps that make them happen. In this e-book, explore the next generation of bot attacks and uncover best-practices for stopping credential theft.
-
Okta + MuleSoft: Comprehensive API Access Control and Management
Sponsored by: OktaAs the most valuable APIs often contain sensitive data, the consequences of getting API security wrong can be significant. It’s critical to implement a solution that enables secure management and access control to your APIs. Read on to learn how Okta and MuleSoft deliver comprehensive API access control and management.
-
Evolve your Security Operations Center
Sponsored by: OptivDigital transformation has revolutionized the way business is conducted. However, cybersecurity hasn’t kept pace with technology changes and trends. Evolving your SOC will help your organization better analyze, plan, build, run and measure. Continue to this video to get started.
-
Assess Secure Web Gateways to Suit Your Network Security Needs
Sponsored by: SearchSecurity.comSecure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.
-
Secure Cloud Transformation
Sponsored by: Menlo SecurityAs a result of the increasing popularity of SaaS tools and applications, organizations are rethinking their infrastructure to include security without sacrificing user experience. In this white paper, take an in-depth look into strategic principles IT leaders are incorporating, and explore Menlo Security’s Cloud Platform.
-
Is the Cloud Transforming Security?
Sponsored by: Menlo SecurityAs IT teams continue to prioritize cloud transformation, it’s imperative to also reconsider security tactics in order to realize the full benefits of cloud services.In this webinar, leverage industry expertise around cloud transformation, security implications, and explore the benefits of isolation tactics.
-
A Computer Weekly buyer's guide to next-generation programming tools
Sponsored by: ComputerWeekly.comAll kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.
-
Take Care When Fighting Mobile Commerce Fraud
Sponsored by: LexisNexis® Risk SolutionsCan you strengthen your defense without making a mess of customer experience? As cybercriminals are getting more sophisticated with their attacks, retailers of all sizes are asking themselves this question. In this white paper, explore what to consider when refining your mobile security strategy.
-
Mobile Commerce Fraud: A Rising Threat to Retailers
Sponsored by: LexisNexis® Risk SolutionsRetailers newer to the mobile channel say that fraud attempts have increased in the past year. Read this white paper explore mobile retail commerce and the factors that contribute to fraud.
-
The Top Automated Bot Threats and How to Stop Them
Sponsored by: RadwareGlobal bot traffic is escalating and intensifying, and malicious bots can now mimic human behavior to scrape data, take over accounts and commit payment fraud. Staying ahead of these threats is important and thus requires security capabilities to detect and stop them. Learn more now.
-
Get Your App Ready for the Global B2B Market
Sponsored by: OktaTo foster a healthy relationship with enterprise partners and customers, you need to allow those users to use their existing enterprise identities to access your applications or shared resources. In this white paper, learn about 4 ways to integrate your enterprise applications and internal systems with your partners and customers’ identities.
-
Consumer Data Right: Open Banking
Sponsored by: Ping Identity CorporationWith consumers growing increasingly reliant on digital services and interfaces, the financial industry is evolving to meet these expectations through open banking interfaces. In this solution brief, explore the Ping Identity Platform, designed to meet Australia’s Open Banking requirements while still providing a seamless user experience.
-
Discover Hidden API Security Vulnerabilities and How to Defend Against Them
Sponsored by: Ping Identity CorporationAlready an attractive target for bad actors, APIs are predicted to soon become the top attack vector. And while APIs may hold the key to compliance with regulations like GDPR, PSD2 and CDR, they also expose potential vulnerabilities. Read this white paper to gain a deeper visibility into your API activity today.
-
Asia-Pacific Cloud Security Study
Sponsored by: Palo Alto NetworksA recently released study by Palo Alto Networks uncovers the truth about the state of cloud security among large enterprises across Asia-Pacific, including many cases where perception doesn’t match the reality of professionals who know best. Download the report to dive deeper into the research.
-
How to Lock Down Git
Sponsored by: PerforceWhile Git allows for developers to collaborate, it can also contribute to loss of intellectual property & significant security issues. This white paper covers tactics designed to mitigate the risks of Git & discusses best practices for securing native Git. Download this report to get started.