ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Application Security Research

  • E-Guide: How to Combat the Latest Cybersecurity Threats

    Sponsored by: TechTarget Security

    It takes a great deal of time and money to fine-tune IT security in response to evolving IT security threats and attack tactics. This expert e-guide provides an in-depth overview of modern computer security threats and offers technical advice on how to deal with them.

  • Expert Guide to web 2.0 Threats: How to Prevent an Attack

    Sponsored by: TechTarget Security

    A majority of today’s organizations already leverage the benefits of Web 2.0 technologies, or at least wonder how they can take advantage of it. This expert e-guide provides an overview of what Web 2.0 really is and explains how to combat the myriad of threats that accompany this convenient technology.

  • E-Guide: Preventing and detecting security vulnerabilities in Web applications

    Sponsored by: TechTarget Security

    The extent of fundamental security flaws in most applications often requires a re-architecture, but there are some secondary measures information security teams can take to safeguard faulty applications. This expert tip maps out the steps security professionals should take to lock down their Web applications.

  • E-Guide: Building a Security Toolkit to Protect Against the Latest Web 2.0 Threats

    Sponsored by: TechTarget Security

    This expert e-guide provides an in-depth overview of the latest Web 2.0 security threats and offers technical advice on how to defend against them.

  • E-Guide: Keys to Protecting Web Applications from Vulnerable Exploits

    Sponsored by: TechTarget Security

    Today’s attackers are stealing substantial amounts of confidential information every day by exploiting vulnerable Web application servers. This expert e-guide highlights the most popular Web application attack methods and offers advice on how to keep your network safe through URL filtering.

  • E-Guide: Cloud computing security - Infrastructure issues

    Sponsored by: TechTarget Security

    While cloud computing provides a number of compelling benefits, it's highly distributed. Understanding how cloud computing providers build services and manage data is critical as it can mean the difference between real cost savings and false economy.

  • Technical guide on Web Security Gateways

    Sponsored by: TechTarget Security

    Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.

  • E-Guide: The dangers of application logic attacks

    Sponsored by: TechTarget Security

    Developing a secure and effective Web application can be daunting. And, hackers aren't making this task any easier. In this tip from our Ask the Experts section, Web application security expert Michael Cobb explains how hackers use application logic to solicit an attack and advises how to prevent them.

  • E-Book: Technical Guide on Web Application Firewalls

    Sponsored by: TechTarget Security

    Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.

  • Sophos Security Threat Report Mid-Year 2011

    Sponsored by: Sophos

    Malware is complex, seemingly everywhere and is often difficult to stop. Targeting high-profile organizations, damaging data loss incidents and web threats continue to make headlines for malware attacks this year. Read the latest report to understand how the latest threats work and how to keep your business safe.

  • The Token is Dead. Long Live the Token

    Sponsored by: SafeNet, Inc.

    View this webcast as speakers discuss hardware and software-based authentication, extending authentication to cloud-based applications, credentialing and managing consumer-grade mobile devices while minimizing security risks, and offer best practices for striking the balance between security, ease of use, manageability and cost

  • IBM Rational and the Financial Services Sector

    Sponsored by: IBM

    Financial services institutions (FSIs) are under tight pressure to reduce cost and risk in the business while improving profitability and enhancing customer satisfaction. But achieving these goals can be a daunting task.  View this paper to explore a systematic approach and key recommendations that FSI should invest in to help tackle these goals.

  • Minimize your financial institution’s risk with solutions from IBM

    Sponsored by: IBM

    Organisations face many challenges as they become more reliant on web technology: web applications are increasingly being targeted, and at the same time, compliance regulations continue to grow in complexity. Learn how to tackle these issues with IBM Rational, a comprehensive solution that provides protection, while helping to ensure compliance.

  • Developing Richer Web based Applications

    Sponsored by: QUALCOMM Incorporated

    This white paper describes industry developments that will lead the browser, JavaScript and the mobile processor to combine for web applications that perform on par with their native counterparts.

  • E-Guide: Writing secure SQL database code

    Sponsored by: IBM

    When developing and deploying a database, organizations should never rely solely on their developers to provide security. This expert e-guide offers tips for writing secure SQL database code to ensure you build appropriate security controls for the specific features and functionality you need.

  • Presentation Transcript: Client-Side Security Issues - The Twilight Zone of Web Security

    Sponsored by: IBM

    This presentation transcript discusses the various types of JavaScript client-side issues that exist in today’s Web applications, their prevalence on the internet and how to locate and fix them.

  • Key Considerations for Adopting Infrastructure as a Service (IaaS)

    Sponsored by: Dell Software

    In this expert e-guide, find answers to four key Web application security questions. Also discover best practices for application-level firewall selection and deployment.

  • Data Loss Prevention: Keep Sensitive Data-In-Motion Safe

    Sponsored by: WatchGuard Technologies, Inc.

    In today’s business environment, media headlines are increasingly featuring data breaches of large magnitudes that put people’s personal information at risk, and no country or industry is immune.

  • Top-10 Guide for Protecting Sensitive Data from Malicious Insiders

    Sponsored by: Imperva

    Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.

  • Presentation Transcript: Focusing on What's Important with Your Web Application Security: Scanning and Testing

    Sponsored by: IBM

    Web application security affects every business in some capacity. Regardless of the industry, there are certain Web security weaknesses you can’t afford to overlook and steps you must take to find them. In this presentation transcrip, expert Kevin Beaver shares what you need to know in order to find Web security vulnerabilities in your environment.

  • Presentation Transcript: Protect Data and Client Trust - An End-to-End Approach to Protecting Your Client Applications and Organizations

    Sponsored by: IBM

    This presentation transcript of the webcast “Protect Data and Client Trust: An End-to-End Approach to Protecting Your Client Applications and Organizations” outlines the people, process, and products that should be leveraged to enhance security throughout your applications and organization.

  • Presentation Transcript: Challenges of Securing a Smarter Planet

    Sponsored by: IBM

    In this presentation transcript of the webcast “Challenges of Securing a Smarter Planet,” IBM Rational's Worldwide Security Executive, Jack Danahy, discusses the changing security landscape and offers guidance to teams looking for the right place to start, and missteps to avoid.

  • E-Guide: Best Practices for Developing Secure Applications

    Sponsored by: IBM

    This expert e-guide brought to you by SearchSecurity.com, explains the importance of integrating application security throughout the entire software development lifecycle and provides 4 tips that must be kept in mind on the application security forefront. Read on to uncover these tips and review an assessment of Web application security.

  • Enterprise Management Associates Report-- The Power of AppScan: A Hands-On Review of IBM Rational AppScan Standard Edition

    Sponsored by: IBM

    In a hands-on look at IBM Rational AppScan Standard Edition, the Enterprise Management Associates® (EMA™) team finds in the product an easily implemented, highly configurable utility that addresses multiple application security pain points.

  •  Five tips to reduce risk from modern web threats

    Sponsored by: Sophos

    User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.