ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Application Security Research

  • How Do Vulnerabilities Get into Software?

    Sponsored by: Veracode, Inc.

    Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.

  • Your Path to a Mature AppSec Program

    Sponsored by: Veracode, Inc.

    Although applications are critical to how businesses operate, web apps are among the top risk areas that hackers attempt to expose. In fact, nearly 40% of global data breaches originate at the application-layer. In this guide, discover what effective application security looks like and learn the steps you can take to reach app sec maturity.

  • What Is Application Security?

    Sponsored by: Veracode, Inc.

    As organizations shift from data hosted in traditional databases to application containers, security needs to also shift to reflect this change. This data sheet provides an overview of application security to equip you with the knowledge you need to get started.

  • Rethinking API Security

    Sponsored by: Okta

    APIs enable organizations with new avenues for enhancing business operations and customer experiences. In this session, we’ll cover the foundations of developing, securing, and managing access to the critical APIs that drive our business.

  • Secure Access to On-prem Apps & Hybrid Cloud Security

    Sponsored by: Okta

    In this data sheet, take a closer look at the key features and capabilities of the Okta Access Gateway – designed to secure access to on-prem applications and secure hybrid cloud capabilities without changing how your apps work. Read on to learn more.

  • CA SiteMinder Migration Guide

    Sponsored by: Okta

    To address issues related to connecting users to apps, organizations adopted services like CA SiteMinder to manage web access. But, as technology evolved, new web access management solutions were needed. In this guide, you’ll learn milestones and best practices for migrating from CA SiteMinder to Okta. Read on to learn more.

  • Definitive Guide to Internet Isolation

    Sponsored by: Menlo Security

    In this e-book, learn about Internet isolation which delivers a Zero Trust Internet by separating an enterprise network from the public web, while still allowing users to access the Internet seamlessly.

  • Avoiding Top 3 Security Challenges of Digital Transformation

    Sponsored by: Menlo Security

    In the current business landscape, there’s no doubt that the web is now the most important business tool. Critical systems that were once on-prem are moving to the cloud as a widely trusted alternative. In this webcast, learn about the top 3 security challenges of digital transformation.

  • What’s Wrong With DAST

    Sponsored by: Wallarm

    Most security organizations use vulnerability scanners and other DAST tools. However, most of the scanners that are deployed today are limited in their coverage. In this white paper, learn about 3 important areas a scanner must address when conducting scans to ensure full coverage.

  • 5 Essential Elements of a Comprehensive Endpoint Security Strategy

    Sponsored by: CyberArk Software, Inc

    Digital transformation continues to be a top priority at organizations. However, business leaders should be aware that a critical part to the digital transformation journey is reconsidering how you monitor and protect endpoints. In this white paper, discover 5 key elements for an effective endpoint security strategy.

  • Top 9 DDoS Threats Your Organization Must be Prepared For

    Sponsored by: Radware

    Each year, cyberattacks grow in frequency and sophistication, leading to varied methods of conducting the same attacks. For distributed denial-of-service (DDoS) attacks, preparing for the “common” attack is no longer enough. This white paper contains the top 9 DDoS threats your organization needs to keep an eye on.

  • Machina Tools — SDKs

    Sponsored by: Ionic Security

    An issue plaguing today’s networks is the siloed approach to security and management, allowing hackers to exploit the gaps and enter your network. In this solution brief, take a closer look at Ionic’s Machina Tools, designed to close these gaps and unify your security strategy.

  • Endpoint Protection Platforms: Analyst Report

    Sponsored by: Trend Micro

    In this Magic Quadrant report, Gartner assesses key vendors within the endpoint security market to provide a comprehensive evaluation of the current tools and platforms. Read on to uncover the findings & discover which endpoint protection platform may be the best-fit for your organization’s needs.

  • Top 5 Use Cases for Cisco Umbrella

    Sponsored by: Cisco Umbrella

    The modern workplace has evolved to include remote access and mobile devices, while also introducing a new generation of complex security threats. In this e-book, 5 customers share the unique ways Cisco Umbrella protects their network. Read on to unlock the use cases.

  • Implementing Privacy Policy: Application Security the Easy Way

    Sponsored by: Ionic Security

    The fundamental issue with data protection is that security is often siloed, but sensitive data isn’t, leaving apps and data at risk. This webcast takes a closer look at Ionic Machina, which focuses on data protection through scalability, visibility, and access management controls. Watch now to learn more.

  • Application Security: The Easy Way

    Sponsored by: Ionic Security

    Securing internal applications is a top priority among IT security teams. Yet achieving it is time & resource consuming. In fact, 76% of total IT expenditure is spent on securing internal apps. It doesn’t need to be so difficult – this blog post highlights how Ionic’s data-centric Machina Tools may be able to help. Read on to learn more.

  • DNS-Layer Protection & Secure Web Gateway Security Efficacy Test Results

    Sponsored by: Cisco Umbrella

    In 2019, AV-TEST, an independent IT security institute, was commissioned by Cisco to conduct a study comparing Cisco cloud security with similar industry-leading solutions to determine the malware protection and phishing block capabilities of all vendors. Read on to uncover the results.

  • The State of Web Application Security

    Sponsored by: Radware

    Download The State of Web Application Security for a summary of current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.

  • Analyst Report of Bot Management Providers, Q1 2020

    Sponsored by: Akamai Technologies

    After evaluating 13 vendors on 10 criteria, The Forrester New Wave: Bot Management, Q1 2020 has named the leaders, strong performers, contenders, and challengers. Download the report to see how the bot management providers stack up.

  • The Spectrum of Mobile Risk: The Full Range of Risks to Enterprise Data

    Sponsored by: Lookout Inc.

    Risk management tactics needs to evolve to address mobile devices and the risks that threaten them. To encourage this evolution, Lookout developed the Mobile Risk Matrix to help organizations better understand the various mobile device risk and how to address them. Read on to unlock the Matrix.

  • How to Keep API Secure from Bot Cyberattacks

    Sponsored by: Radware

    Application programming interfaces (APIs) have emerged as the bridge to facilitate communication between different application architectures. Despite their rapid and widespread deployment, APIs remain poorly protected and can leave business-critical services are at risk due to bot attacks. Learn how you can stay protected in this white paper.

  • WAFs Should Do More Than Cover the OWASP Top 10

    Sponsored by: Radware

    As applications become more prevalent in everyday life, they become increasingly attractive targets for hackers. For organizations, securing applications is paramount to avoiding financial, legal and reputational cost. Read on to uncover 4 key application security challenges organizations face, underlining the importance of strong WAFs.

  • Ultimate Guide to Bot Management

    Sponsored by: Radware

    Bots have completely revolutionized the way we interact digitally. In fact, bots account for more than half of all internet traffic. Unfortunately, some bots play a more sinister role – committing acts of fraud. In this e-book, explore the threats posed by malicious bots and discover tactics for detecting & mitigating these risks.

  • The Secure DevOps Imperative: 3 Best Practices for Securing Cloud Applications

    Sponsored by: Trend Micro

    The rapid adoption of cloud technologies has required a unified development and deployment approach with increased involvement of the cybersecurity team. Given the amount of sensitive data residing in cloud applications, incorporating security is critical. Download this white paper to unlock 3 best practices for securing cloud native applications.

  • The Top Automated Bot Threats to Applications and How to Stop Them

    Sponsored by: Radware

    Today, malicious bots compromise of 26% of total internet traffic. Bots scour the internet, and bypass traditional security methods in order to attack online businesses. So, how can your organization be better equipped to handle this threat? Download this white paper to uncover the top threat tactics & how to mitigate them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.