Web Application Security Research
-
Consumer Web Portals: Platforms at Significant Security Risk
Sponsored by: EMC CorporationThis profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
-
Technical Guide on Application Security
Sponsored by: TechTarget SecurityThis expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools.
-
Tolly Test Report: IBM Security Web Gateway Appliance
Sponsored by: IBMThis whitepaper details a security solution to sure up the vulnerabilities associated with web application exposure.
-
An Integrated Approach to Managing Application Security
Sponsored by: IBMThis white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
-
Protect People, Processes, and Technology From Web Application Threats
Sponsored by: IBMThis resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.
-
NoSQL Does Not Have to Mean No Security
Sponsored by: IBMThis white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems.
-
Next-Generation Security for Today's Data Center
Sponsored by: IBM and JuniperThis crucial resource discusses next-generation security solutions that can offer unparalleled protection against data exfiltration, website outages, and other serious threats against the data center.
-
Mapping Security for your Virtual Environment
Sponsored by: Hewlett Packard EnterpriseAccess this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.
-
Web Application Security Insider's Edition
Sponsored by: TechTarget SecurityThis Insider Edition will help you understand threats against Web applications, how you can help developers with security tools and training and how to deploy technologies such as Web application firewalls to keep your organization's Web presence safe.
-
How The Burgiss Group Manages Business Risk with AppFirst
Sponsored by: AppFirstThis case study reveals which solution the Burgiss Group trusts to help them monitor the behavior of their applications and systems and – in turn – ensure an optimal experience for their clients. View now to learn more!
-
Symantec Internet Security Threat Report
Sponsored by: Symantec CorporationThis report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
-
College Board Case Study: Quality Software is Secure Software
Sponsored by: IBMIn this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe.
-
Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business
Sponsored by: IBMThis crucial webcast examines how you can protect existing and developing applications and provides some best practices for ensuring end-to-end application security.
-
Creating the Ultimate Security Platform
Sponsored by: IBMThis whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
-
Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert
Sponsored by: Thawte Inc.This e-guide from SearchSecurity.com outlines how to address web app design flaws and fight these weaknesses once and for all.
-
Bring Your Own Security to the Cloud
Sponsored by: CenterBeamWatch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
-
SSL Certificate Management: Avoiding Common Mistakes
Sponsored by: GeoTrust, Inc.This expert E-Guide from SearchSecurity.com explores the common mistakes inherent to SSL certificate management and provides advice on how to avoid them. View now to learn more!
-
Taking Action to Secure Web Applications
Sponsored by: TechTarget SecurityThis expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.
-
PCI Council issues mobile application rules for software developers
Sponsored by: TechTarget SecurityThe Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
-
SSL Certificate Management: Common Mistakes and How to Avoid Them
Sponsored by: Thawte Inc.This expert E-Guide explores the most common SSL certificate management mistakes that can set the stage for a Web application exploit, and offers key advice for avoiding these errors – read on to learn more now.
-
Web-Facing Applications: Mitigating Likely Web Application Threats
Sponsored by: TechTarget SecurityIn this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.
-
Web Application Firewalls: Patching, SDLC Key for Security, Compliance
Sponsored by: TechTarget SecurityIn this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.
-
Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert
Sponsored by: Symantec CorporationThis expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now.
-
IBM Security Network Intrusion Prevention System
Sponsored by: IBMThis 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.
-
ISM December 2012
Sponsored by: TechTarget SecurityIn this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.