ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Application Security Research

  • Your App Security Stack: How to Defend Against the Evolving Threat

    Sponsored by: Arxan

    In this webcast, Ken Jochims from Arxan sits down with Forrester Research Principal Analyst, Amy DeMartine, to talk about app security and the evolving threat landscape in 2019.

  • App Dev Trends to Watch in 2019

    Sponsored by: Magenic

    Technologies from cloud-native development, to container-based development and deployment, serverless computing, and more have made waves in 2018. But where does the future of these technologies lie as we head into the new year?

  • Securing Web Apps From the Inside Out

    Sponsored by: Arxan

    To protect against threats to JavaScript apps, organizations need more than just WAFs, they need a way to secure apps from the inside out, starting with code. Download this white paper to learn about a multilayered approach that can help protect your apps before it's too late.

  • AO.com, When It's Time for a Change

    Sponsored by: Cloudflare

    AO.com is the largest online-only electricals retailer in the UK, and wanted to achieve better site performance across all of their web domains. Read this white paper to find out why AO decided on Cloudfare to help optimize their sites, and see how Cloudfare helped reduce web page sizes by 50%.

  • Why Web Performance Matters

    Sponsored by: Cloudflare

    Watch this webinar to see how Cloudflare can help accelerate web performance using their 150+ data centers around the world, and see a demonstration from Catchpoint on how to use their synthetic monitoring platform.

  • The Beginner's Guide to Threat Hunting

    Sponsored by: DomainTools

    Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents. In this webcast, learn about the key steps to creating a threat hunting process.

  • SANS Fingerprinting Threat Actors with Web Assets

    Sponsored by: DomainTools

    Threat intelligence helps companies better predict the actions of threat actors to stay ahead of their attacks. In order to do this, organizations must learn more about the enemy. In this webcast, SANS instructor Rebekah Brown and Data Systems Engineer at DomainTools, Mike Thompson discuss ways to better fingerprint threat actors.

  • How To Analyze and Investigate Malicious Javascript Attacks

    Sponsored by: DomainTools

    The increased frequency of JavaScript attacks creates big problems when trying to protect your users. JavaScript is the top language running on the web with 80% of the top 1 million sites using it in some capacity. In this webcast, Tarik Saleh, Keith Hoodlet and Paul Asadoorian will show you several different forms of malicious JavaScript.

  • Deeper Security Coverage for Any Environment

    Sponsored by: Alert Logic

    When alerts and incidents coming in are at an all-time high, IT teams looks for additional security options to help. In this resource, learn how to block malicious web traffic, reduce false positives, conduct threat analysis, and more.

  • Cybersecurity for the Modern Era: Choosing People-Centered Solutions

    Sponsored by: Proofpoint

    Firewalls, intrusion detection and prevention systems, network defenses, endpoint antivirus software and the like are all important. But none of them address today's real security issue: people. Download this eBook to learn about different cyberattacks that specifically target people and how you can shape your security strategy to prevent them.

  • 5 Techniques to Protect Against a SQL Injection Attack

    Sponsored by: Alert Logic

    SQL Injection, the hacking technique that has caused havoc since first being identified in 1998, is still being used on a regular basis. Download this e-book for 5 preventive techniques to get ahead of cybercriminals and secure your SQL-based apps from injections, today.

  • Human Factor Report 2018

    Sponsored by: Proofpoint

    This 2018 Human Factor Report teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.

  • A Quick History of IoT Botnets

    Sponsored by: Radware

    Gartner estimates that there will be 20 billion connected devices by 2020. Access this resource to learn about the history of IoT botnets and how the rise of connected devices can bring upon the rise of dangerous bot attacks.

  • Evolving Threat of Botnets, Web Scraping and IoT Zombies

    Sponsored by: Radware

    By 2020, the number of IoT units installed could reach as many as 20 billion, according to Gartner. This resource examines the severity of dangerous bots, which exploit IoT devices as weapons of attack.

  • Mitigating the SSL/TLS Cybersecurity Threat

    Sponsored by: Radware

    75% of web traffic will be encrypted by 2019, according to NSS Labs. Utilize this e-book to learn how to combat the growing number of complex encrypted web attacks as well as mitigate SSL/TLS cybersecurity threats.

  • Why Websites Stay Vulnerable: And What You Can Do About It

    Sponsored by: WhiteHat Security

    Web application attacks represent a major threat to an organization's security posture. According to the Verizon DBIR, 30% of breaches involve web attacks. Take a look at this webinar to learn about vulnerabilities within websites and how you can increase your web application security.

  • Web Application Authorization and Authentication Explained

    Sponsored by: WhiteHat Security

    According to the 2017 Verizon DBIR, 30% of total breaches reported involved attacks on web applications. Explore this webinar to gain insight into application authorization and authentication in order to enhance your application security program.

  • The Art of Application Security: Getting Started with DevSecOps

    Sponsored by: WhiteHat Security

    According to the Verizon DBIR, 60% of breaches involved web app attacks. Take a look at this white paper to discover best practices for application security as well as a case study example to prove the benefits of the application security best practices.

  • Why Web Application Attacks are a Growing Threat to the Cloud

    Sponsored by: Oracle Dyn

    New research found that web application attacks present a significant threat to cloud environments. Find out what cybersecurity expert, Rob Shapland, has to say as he explains these risks and what enterprises should do about them.

  • Cryptojacking Attacks May Not Challenge Ransomware Dominance

    Sponsored by: Cisco Umbrella

    Cryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.

  • All You Need to Know about SSO

    Sponsored by: HYPR

    The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.

  • How to Address Key SSL Security Issues and Vulnerabilities

    Sponsored by: A10 Networks

    Don't compromise your website security. Explore this expert e-guide to reveal the new SSL security landscape and uncover emerging security issues within SSL technology.

  • Use a web app firewall to halt app attacks

    Sponsored by: SearchSecurity.com

    Web application firewalls are more essential than ever when it comes to halting app attacks. Learn what features and functions you should look for when choosing a new WAF.

  • What to Look for in Web Fraud Detection Systems

    Sponsored by: SearchSecurity.com

    In this TechTarget Buyer's Guide readers will learn the key features of a Web fraud detection product and how to choose the best product for their company.

  • API Security Now

    Sponsored by: SearchSecurity.com

    Secure APIs are possible but not easy. This guide outlines the source for security risks with application program interfaces, and how to eliminate them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.