Web Application Security White Papers
-
Bad bots make up a quarter of APAC's web traffic
Sponsored by: TechTarget ComputerWeekly.comBots that run automated tasks have been responsible for stealing personal information among other malicious activities in the Asia-Pacific region, study finds.
-
Toughening up web and mobile application security
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.
-
Top 10 ASEAN IT stories of 2021
Sponsored by: TechTarget ComputerWeekly.comFrom adopting DevOps practices to rolling out award-winning credit processing platforms, ASEAN organisations have what it takes to be on the cutting edge of digital transformation. In this roundup, we recap the top 10 ASEAN IT stories in 2021, including the opportunities and challenges that organisations in the region have faced over the past year.
-
How Do Vulnerabilities Get Into Software?
Sponsored by: Veracode, Inc.Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
-
What secure email gateways can do for your enterprise
Sponsored by: TechTarget SecurityIt is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
-
Assess Secure Web Gateways to Suit Your Network Security Needs
Sponsored by: TechTarget SecuritySecure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.
-
Why Web Application Attacks are a Growing Threat to the Cloud
Sponsored by: Oracle DynNew research found that web application attacks present a significant threat to cloud environments. Find out what cybersecurity expert, Rob Shapland, has to say as he explains these risks and what enterprises should do about them.
-
Cryptojacking Attacks May Not Challenge Ransomware Dominance
Sponsored by: Cisco UmbrellaCryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.
-
All You Need to Know about SSO
Sponsored by: HYPRThe most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.
-
How to Address Key SSL Security Issues and Vulnerabilities
Sponsored by: A10 NetworksDon't compromise your website security. Explore this expert e-guide to reveal the new SSL security landscape and uncover emerging security issues within SSL technology.
-
Use a web app firewall to halt app attacks
Sponsored by: TechTarget SecurityWeb application firewalls are more essential than ever when it comes to halting app attacks. Learn what features and functions you should look for when choosing a new WAF.
-
What to Look for in Web Fraud Detection Systems
Sponsored by: TechTarget SecurityIn this TechTarget Buyer's Guide readers will learn the key features of a Web fraud detection product and how to choose the best product for their company.
-
API Security Now
Sponsored by: TechTarget SecuritySecure APIs are possible but not easy. This guide outlines the source for security risks with application program interfaces, and how to eliminate them.
-
What to Look For in a Web Application Scanner
Sponsored by: TechTarget SecurityWith so many Web applications on enterprise networks today, a scanner is essential to security. Here's what you need to know if you're in the market for a Web app scanner.
-
Protect Your Web Applications from the OWASP Top 10
Sponsored by: IBMApplications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
-
Be a Web App Security Superhero
Sponsored by: TechTarget SecurityTo secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.
-
What to Look for in Web Application Firewall Products
Sponsored by: TechTarget SecurityIn this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
-
Protect People, Processes and Technology from Web Application Threats
Sponsored by: IBMSecuring externally facing applications is an important step toward safeguarding your critical assets. Find out why.
-
HP Fortify on Demand
Sponsored by: Hewlett Packard EnterpriseAccess this data sheet to discover an on-demand solution that tests the security of software quickly, accurately, and affordably.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Sponsored by: TechTarget SecurityBigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
Cloud Security Designed for Amazon Web Services (AWS)
Sponsored by: Trend MicroThis white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.
-
Tolly Test Report: IBM Security Web Gateway Appliance
Sponsored by: IBMThis white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.
-
Web Application Firewalls Are Worth the Investment for Enterprises
Sponsored by: ImpervaThis resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
-
Discovering Vulnerable Web Applications
Sponsored by: QualysThis paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.
-
How to Leverage Free Tools to Secure Web Apps
Sponsored by: ImpervaExpert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.