ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Application Security White Papers

  • Bad bots make up a quarter of APAC's web traffic

    Sponsored by: TechTarget ComputerWeekly.com

    Bots that run automated tasks have been responsible for stealing personal information among other malicious activities in the Asia-Pacific region, study finds.

  • Toughening up web and mobile application security

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.

  • Top 10 ASEAN IT stories of 2021

    Sponsored by: TechTarget ComputerWeekly.com

    From adopting DevOps practices to rolling out award-winning credit processing platforms, ASEAN organisations have what it takes to be on the cutting edge of digital transformation. In this roundup, we recap the top 10 ASEAN IT stories in 2021, including the opportunities and challenges that organisations in the region have faced over the past year.

  • The Essential Guide To Secure Web Gateway

    Sponsored by: AT&T Cybersecurity

    Download this white paper to better understand the secure web gateway and its place within your security stack.

  • How Do Vulnerabilities Get Into Software?

    Sponsored by: Veracode, Inc.

    Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.

  • What secure email gateways can do for your enterprise

    Sponsored by: TechTarget Security

    It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.

  • Assess Secure Web Gateways to Suit Your Network Security Needs

    Sponsored by: TechTarget Security

    Secure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.

  • Why Web Application Attacks are a Growing Threat to the Cloud

    Sponsored by: Oracle Dyn

    New research found that web application attacks present a significant threat to cloud environments. Find out what cybersecurity expert, Rob Shapland, has to say as he explains these risks and what enterprises should do about them.

  • Cryptojacking Attacks May Not Challenge Ransomware Dominance

    Sponsored by: Cisco Umbrella

    Cryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.

  • All You Need to Know about SSO

    Sponsored by: HYPR

    The most important part of single sign-on (SSO) deployment is planning. In this e-guide, security experts Joel Dubin and Eric Klein offer SSO best practices for deployment and integrating mobile app access.

  • How to Address Key SSL Security Issues and Vulnerabilities

    Sponsored by: A10 Networks

    Don't compromise your website security. Explore this expert e-guide to reveal the new SSL security landscape and uncover emerging security issues within SSL technology.

  • Use a web app firewall to halt app attacks

    Sponsored by: TechTarget Security

    Web application firewalls are more essential than ever when it comes to halting app attacks. Learn what features and functions you should look for when choosing a new WAF.

  • What to Look for in Web Fraud Detection Systems

    Sponsored by: TechTarget Security

    In this TechTarget Buyer's Guide readers will learn the key features of a Web fraud detection product and how to choose the best product for their company.

  • API Security Now

    Sponsored by: TechTarget Security

    Secure APIs are possible but not easy. This guide outlines the source for security risks with application program interfaces, and how to eliminate them.

  • What to Look For in a Web Application Scanner

    Sponsored by: TechTarget Security

    With so many Web applications on enterprise networks today, a scanner is essential to security. Here's what you need to know if you're in the market for a Web app scanner.

  • Protect Your Web Applications from the OWASP Top 10

    Sponsored by: IBM

    Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.

  • Be a Web App Security Superhero

    Sponsored by: TechTarget Security

    To secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.

  • What to Look for in Web Application Firewall Products

    Sponsored by: TechTarget Security

    In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.

  • Protect People, Processes and Technology from Web Application Threats

    Sponsored by: IBM

    Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.

  • HP Fortify on Demand

    Sponsored by: Hewlett Packard Enterprise

    Access this data sheet to discover an on-demand solution that tests the security of software quickly, accurately, and affordably.

  • Countering Cyber-Crime with a Sharp Eye and a Clear Plan

    Sponsored by: TechTarget Security

    Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.

  • Cloud Security Designed for Amazon Web Services (AWS)

    Sponsored by: Trend Micro

    This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud.

  • Tolly Test Report: IBM Security Web Gateway Appliance

    Sponsored by: IBM

    This white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.

  • Web Application Firewalls Are Worth the Investment for Enterprises

    Sponsored by: Imperva

    This resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.

  • Discovering Vulnerable Web Applications

    Sponsored by: Qualys

    This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.