ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Application Security Research

  • Presentation Transcript: Protecting Against Malware with Web Security Gateways and Services

    Sponsored by: TechTarget Security

    Many organizations are moving malware protection to the Web and investing in Secure Web Gateways. This  transcript will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products.

  • Thwarting Sophisticated Attacks with Today’s Firewalls

    Sponsored by: TechTarget Security

    This expert resource explores modern network security, offering key insight into fighting today’s sophisticated threats as well as the differences between next-generation firewall (NGFW) and unified threat management (UTM).

  • Security risks that can affect your industry

    Sponsored by: TechTarget Security

    As the threat landscape continues to evolve, the approaches to thwart them must also. But with emerging trends like social networking and the influx of mobile devices, ensuring adequate security is becoming more complex. In this expert resource, explore the security risks organizations face in today’s changing environment.

  • E-Guide: Expert insights to application security testing and performance

    Sponsored by: TechTarget Security

    Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle.

  • E-Guide: Best practices for pen testing Web applications

    Sponsored by: TechTarget Security

    This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.

  • E-Guide: Shortcut guide to Web application firewall deployment

    Sponsored by: TechTarget Security

    Before purchasing a Web application firewall (WAF), there are several factors all organizations must consider. This expert tip offers advice on how to pick a WAF that best fits your organization and lays out the steps for successful deployment.

  • E-Guide: Using web application firewalls to ease compliance efforts

    Sponsored by: TechTarget Security

    When properly maintained, Web application firewalls help organizations ease PCI management and compliance obligations. This expert guide highlights the various compliance benefits WAF provide and explains how they can also be used to protect against both common and emerging threats.

  • ISM December 2012

    Sponsored by: TechTarget Security

    In this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.

  • Prioritizing WAN Application Delivery Go Beyond WAN QoS

    Sponsored by: Talari_DON'T USE

    This E-Guide from SearchEnterpriseWAN.com describes why Quality of Service (QoS) is not the cure-all it used to be and explores how to go beyond the constraints of WAN QoS to safeguard and deliver the applications in your enterprise.

  • The Benefits of Next-Generation Virtual ADCs

    Sponsored by: Citrix Systems, Inc.

    Discover why next-generation and virtual application delivery controllers (ADCs) can help you conquer many of the networking and security challenges of enterprise mobility and cloud computing.

  • Strategies for Managing Social Networking & Personal Web Use in the Workplace

    Sponsored by: Total Defense

    Access to Web content in the workplace such - as social networking, streaming media and more - has become an increasing issue. This resource explores the risks and challenges of personal Web use as well as presents a business case for enabling appropriate use. View now to uncover key strategies that will help you protect your business.

  • Imperva's Web Application Attack Report

    Sponsored by: Imperva

    Imperva’s Application Defense Center (ADC), as part of its ongoing Hacker Intelligence Initiative, studied web application attacks across 40 applications over a six month period. View this report to explore key findings and gain recommendations to help you better prioritize vulnerability remediation and web application projects.

  • Akamai Shields Leading Retailer from Ddos Attacks During Critical Holiday Shopping Period - and Protects $10 Million in Revenues

    Sponsored by: Akamai Technologies

    In this case study, learn how one online retailer was able to maintain online operations and protect $10 million in revenue by implementing Akamai’s DDoS Defender Security Solution and utilizing Akamai Intelligent Platform to deflect and reflect malicious attacks.

  • Understanding the Value behind Enterprise Application-Aware Firewalls

    Sponsored by: Dell SonicWALL

    This expert resource examines the value of enterprise application-aware firewalls and why they are in such high-demand among users.

  • The four rules of complete web protection

    Sponsored by: Sophos

    As an IT manager you’ve always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it’s time to revisit your strategy. This whitepaper discusses the major web threats and provides four rules to help you stay protected. When you follow them, these rules will also save you time and money.

  • How to prevent cross-site scripting attacks: Expert tactics

    Sponsored by: TechTarget Security

    This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks.

  • IBM Mashup Center

    Sponsored by: IBM

    IBM Mashup Center is an enterprise mashup platform enabling the rapid creation of reusable application building blocks (widgets, feeds, mashups) that can be easily assembled into new applications or leveraged within existing applications— with the governance and security IT requires—  to address daily business challenges.

  • Presentation Transcript: Reduce the Cost of Being Secure by Building Security into your Development Process

    Sponsored by: IBM

    In this presentation transcript, explore the importance of application security and the business case for building security in from the start.  Find out how your development tools can assist you in meeting your security objectives.

  • State of Software Security Report Volume 4

    Sponsored by: Veracode, Inc.

    Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.

  • Presentation Transcript: Are your applications cloud-ready?

    Sponsored by: IBM

    This presentation transcript discusses the importance of application security, and describes the tools and processes you should be putting in place to ensure that your applications are secure as you move them to the cloud.

  • Social Networking malware: The dangers facing SMBs

    Sponsored by: GFI Software

    View this paper to explore the rise of social networking, the types of malware targeting social platforms, how SMBs can protect themselves against today’s social threats, and more.

  • Keeping Networks safe from Social Networking

    Sponsored by: BlueCoat

    Social Networking has provided attackers with an innovative way to gain information from within your corporate networks. This expert E-Guide will provide you with the information needed to keep your organization safe from the threats of social networking.

  • WebPulse Collaborative Defense

    Sponsored by: BlueCoat

    Malware is constantly evolving, so you need a dynamic security defense that can keep up with the latest web-based threats. Learn how the Blue Coat WebPulse™ collaborative defense powers Blue Coat's web security portfolio, delivering fast and effective Web 2.0 threat protection for 75 million users worldwide.

  • Is your security as good as the cloud’s?

    Sponsored by: Trend Micro, Inc.

    This paper examines the relative merits of Software-as-a-Service and Infrastructure-as-a-Service, as well as issues and risks to consider. View now to determine whether these models are likely to provide better or worse security than your current in-house security.

  • Imperva’s Web Application Attack Report

    Sponsored by: Imperva

    Imperva’s Application Defense Center studied web application attacks across 30 applications, monitoring more than 10 million individual attacks targeted over a period of six months. This report offers key findings of their study and recommendations to help you better prioritize vulnerability remediation and web application projects.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.