ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Application Security Multimedia

  • Webinar: Latest Fraud Schemes in Retail and Hospitality

    Sponsored by: Shape Security

    Up to 99% of the traffic on retail and e-commerce login forms are due to account takeover (ATO) attempts. In this webinar, Shape Security's Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs.

  • Mimecast Cyber Resilience For Email

    Sponsored by: Mimecast

    Listen as Joel Bedoford and Phillip Clark from Mimecast explore the current cyber resilience landscape for Australian businesses and unpack survey results from 257 IT decisions makers on the topic of Cyber Resilience for Email.

  • How Internet Isolation Eliminates Threats That Evade Sandboxes

    Sponsored by: Menlo Security

    Many organizations rely on a sandbox to protect against sophisticated email or malware threats. However, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. In this webinar, Vinay Pidathala will discuss these techniques and how to defend against them using Internet Isolation.

  • How to Automate an API Security Program

    Sponsored by: Data Theorem

    Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.

  • Your App Security Stack: How to Defend Against the Evolving Threat

    Sponsored by: Arxan

    In this webcast, Ken Jochims from Arxan sits down with Forrester Research Principal Analyst, Amy DeMartine, to talk about app security and the evolving threat landscape in 2019.

  • Why Web Performance Matters

    Sponsored by: Cloudflare

    Watch this webinar to see how Cloudflare can help accelerate web performance using their 150+ data centers around the world, and see a demonstration from Catchpoint on how to use their synthetic monitoring platform.

  • The Beginner's Guide to Threat Hunting

    Sponsored by: DomainTools

    Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents. In this webcast, learn about the key steps to creating a threat hunting process.

  • SANS Fingerprinting Threat Actors with Web Assets

    Sponsored by: DomainTools

    Threat intelligence helps companies better predict the actions of threat actors to stay ahead of their attacks. In order to do this, organizations must learn more about the enemy. In this webcast, SANS instructor Rebekah Brown and Data Systems Engineer at DomainTools, Mike Thompson discuss ways to better fingerprint threat actors.

  • How To Analyze and Investigate Malicious Javascript Attacks

    Sponsored by: DomainTools

    The increased frequency of JavaScript attacks creates big problems when trying to protect your users. JavaScript is the top language running on the web with 80% of the top 1 million sites using it in some capacity. In this webcast, Tarik Saleh, Keith Hoodlet and Paul Asadoorian will show you several different forms of malicious JavaScript.

  • Why Websites Stay Vulnerable: And What You Can Do About It

    Sponsored by: WhiteHat Security

    Web application attacks represent a major threat to an organization's security posture. According to the Verizon DBIR, 30% of breaches involve web attacks. Take a look at this webinar to learn about vulnerabilities within websites and how you can increase your web application security.

  • Web Application Authorization and Authentication Explained

    Sponsored by: WhiteHat Security

    According to the 2017 Verizon DBIR, 30% of total breaches reported involved attacks on web applications. Explore this webinar to gain insight into application authorization and authentication in order to enhance your application security program.

  • College Board Case Study: Quality Software is Secure Software

    Sponsored by: IBM

    In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe.

  • Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business

    Sponsored by: IBM

    This crucial webcast examines how you can protect existing and developing applications and provides some best practices for ensuring end-to-end application security.

  • Bring Your Own Security to the Cloud

    Sponsored by: CenterBeam

    Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.

  • IBM Security Network Intrusion Prevention System

    Sponsored by: IBM

    This 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.

  • IBM Mashup Center

    Sponsored by: IBM

    IBM Mashup Center is an enterprise mashup platform enabling the rapid creation of reusable application building blocks (widgets, feeds, mashups) that can be easily assembled into new applications or leveraged within existing applications— with the governance and security IT requires—  to address daily business challenges.

  • The Token is Dead. Long Live the Token

    Sponsored by: SafeNet, Inc.

    View this webcast as speakers discuss hardware and software-based authentication, extending authentication to cloud-based applications, credentialing and managing consumer-grade mobile devices while minimizing security risks, and offer best practices for striking the balance between security, ease of use, manageability and cost

  • Deep Security 7.5

    Sponsored by: Trend Micro, Inc.

    Protect your virtualized environment by learning what Deep Security 7.5 can do for you. Watch this video to learn so much more about Deep Security 7.5.

  • Trial download: IBM Rational AppScan

    Sponsored by: IBM

    Download this free trial to experience how IBM Rational AppScan software helps you quickly and easily pinpoint Web application vulnerabilities.

  • Introduction to crystalreports.com

    Sponsored by: Business Objects

    Sharing reports over the Web is convenient and efficient, yet if it is not done securely, the information can be easily compromised. Attend this Webcast to learn how your business can instantly and securely deliver reports to improve productivity and ...

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.