ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Application Security White Papers

  • Exploiting a Pandemic: White House COVID-19 Phishing Scams

    Sponsored by: Inky Technology

    It is important to understand that we are living in a time of extreme vulnerability, and this is no less apparent than to those who are working in security. Increased internet use has led to an increase in phishing scams of all kinds. View this e-book to understand what it looks like when a phisher imitates the White House and the President.

  • Around the World in 34 Phish: COVID-19 Phishing Examples

    Sponsored by: Inky Technology

    The state of the world has left email servers more vulnerable to attack than ever. As phishing is the most used method of cyberattack in the world, there have been plenty of examples to identify and dissect to help people develop a more watchful eye. Browse this article to see 34 different examples of phishing scams across the globe.

  • BotRx ProTx Mobile Application Security

    Sponsored by: BotRX

    Mobile applications have emerged as one of the most lucrative threat vectors for a cybercriminal interested in orchestrating a malicious bot attack. In order to protect your organization’s mobile app and subsequent data, security tactics need to be dynamic. Read this data sheet to learn how BotRx protects web and mobile apps against bot attacks.

  • BotRx ProTx for eCommerce

    Sponsored by: BotRX

    For eCommerce organizations, the increasing use of web and mobile apps present a potentially lucrative vector for hackers. In fact, nearly half of online traffic on eCommerce sites is malicious bots – so what can organizations do to protect against these threats? Read this data sheet to learn about how BotRx is helping their users.

  • Definitive Guide to Moving Target Defense for Automated Bot Attacks

    Sponsored by: BotRX

    As of February 2020, the total number of websites has topped 1.7 billion, with nearly half of the traffic to those sites credited to bots. Threat actors have evolved malicious bots to where their detection has become near-impossible, even by advanced AI & ML. But there’s another way. Read this white paper to learn about Moving Target Defense.

  • AppSec for the Newly Hired CISO/CSO

    Sponsored by: Contrast Security

    For new CISOs and CSOs, the tasks and demands of the new role can be overwhelming – especially as digital transformation changes conventional approaches to application security. Read this e-book for AppSec guidance and best practices for new CISO/CIOs.

  • Twitter Phone Spear Phishing Attack

    Sponsored by: Lookout

    On July 15th, 2020, Twitter experienced a security incident where a malicious actor gained access to the back-end account management console through a phone spear phishing campaign. 130 accounts, including those of Barack Obama, Bill Gates and Elon Musk, were affected. Read this white paper to learn specifics and recommendations.

  • The Evolution of Application Fraud

    Sponsored by: F5 Networks

    Cyberattacks targeting business applications have been on the rise in recent years – an issue made exponentially more prominent as web applications grew in popularity due to COVID-19 changes. This resource provides an overview of the evolution of application fraud – read on to get started.

  • The New Business Imperative

    Sponsored by: F5 Networks

    In a business environment where customer behavior is changing, digital transformation is accelerating, the threat of fraud is proliferating and challengers are gaining ground, organizations must change their approach to succeed. Read on to learn more about balancing user functionality and cost-effectiveness.

  • Why Seconds Matter

    Sponsored by: Palo Alto Networks

    Todays' hackers are enjoying threats such as polymorphic malware that can avoid detection by constantly changing its identifiable features. How do security teams get around malleable threats? With inline machine learning, organizations may be able to stop threats while keeping business going. To learn more, read this comprehensive white paper.

  • Global Data at Risk: State of the Web Report

    Sponsored by: Tala Security

    2020 has indisputably been defined as a year of unique events with significant, long-lasting implications. The following report explores the state of the web in order to provide you with emerging trends, threat vectors, hacker behavioral patterns and more – read on to unlock the Global Data at Risk: 2020 State of the Web Report.

  • 92% Of The World’s Top Websites Expose Customer Data To Attackers

    Sponsored by: Tala Security

    It’s no secret that security risk has never been higher, but what’s important is to know the specifics of these risks. Issues such as unintentional data exposure and data leakage via trusted applications are becoming more relevant, and it’s crucial that you know what they mean and how to prevent them. View this report to get the details.

  • Danger Within: Email and Security Awareness Training Strategies for Effective Account Takeover Protection

    Sponsored by: Mimecast

    It’s a common misconception that email-borne attacks come only from outside the organization. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.

  • Cradlepoint NetCloud Work From Anywhere Solution vs. Consumer Grade Hotspots

    Sponsored by: CradlePoint

    Is your organization looking for a way to easily manage all of your devices at scale through the cloud, from anywhere? Is it important that you deploy consistent security policies to all of your routers? View this data sheet for an in-depth look at a solution that includes wireless routers with enterprise-class reliability, security and management.

  • Covid-19 & the New Normal for E-commerce

    Sponsored by: Tala Security

    While online shopping has increased dramatically since the beginning of the pandemic, so too have threats targeting shoppers and other users. In fact, Magecart attacks have increased by 20%. Read on to explore how COVID-19 is shifting the e-commerce landscape and discover the long-term implications of these changes.

  • It’s All About the Data

    Sponsored by: Tala Security

    Online retailers are quickly realizing that enhanced user experience often comes at the cost of security – but that doesn’t necessarily need to be the case. In this blog post, take a closer look at the challenges, risks and opportunities as they related to data privacy and security.

  • Evaluating Client-side Web Security: Questions to Ask Your Vendor

    Sponsored by: Tala Security

    When it comes to online interactions, protecting end-users from Magecart, XSS and other data theft attacks is critical to safeguarding both their sensitive data as well as brand reputation. This article offers 3 questions you should be asking your web security vendor – and why they matter.

  • The Latest Trend in Network Cybersecurity: NDR

    Sponsored by: Fidelis

    It is not enough to merely detect threats quickly – response must be just as swift. Network detection and response (NDR) has grabbed the attention of network professionals. It utilizes automation and proactive capabilities to detect threats and add them to the ‘playbook’ once they’re found. Glimpse at this white paper to learn more.

  • Securing Web Operations for a Fortune 500 Financial Institution

    Sponsored by: Tala Security

    In this case study, Tala partners with a Fortune 500 financial institution to address key cybersecurity and operational challenges related to the growing volume and usage of web applications. Read on for an in-depth look at the financial institution’s specific challenges, required capabilities, and the results of their partnership with Tala.

  • Tala At RSAC Innovation Sandbox: Threats To Cybersecurity

    Sponsored by: Tala Security

    In this short white paper, the CEO of Tala Security, Aanand Krishnan, reveals his business experiences during pandemic and why cybersecurity is more important than ever before. Download the PDF to uncover his thoughts and cybersecurity advice.

  • DTEX and the Insider Threat Kill Chain

    Sponsored by: Dtex

    With insider threats, you must ask yourself, ‘What was the user’s intent?’, ‘What it truly an insider, or were credentials compromised?’, ‘If so, how did the credential thief get into the account?’. Preventing these attacks requires visibility and intelligence. Read this e-book for 5 steps to insider attack prevention.

  • If Security Is Slowing Down Your Website’s Performance, You’re Doing It Wrong!

    Sponsored by: Tala Security

    The numbers are in: slow websites suffer. 47% of users expect a website to load in two seconds, and 79% will not return to a site that had previously performed poorly for them. The problem is that you also need to secure your website, which slows it down inherently. Read this white paper to discover how to balance security and speed on your site.

  • Data Protection for Kubernetes on VMware

    Sponsored by: Dell Technologies

    Containers were originally developed as a method to package, deploy and isolate applications from each other to improve density. But as cloud native applications have matured, so too has the orchestration capabilities of containers. Download this white paper to learn more about data protection for containerized apps.

  • Keep Out Vulnerable Third-Party Scripts That Help Steal Data from Your Website

    Sponsored by: Akamai Technologies

    Tap into this article to learn about Akamai’s intelligent edge platform that can detect malicious script activity, protect the integrity of webpages, and safeguard businesses.

  • SIG - AV-TEST: DNS-Layer Protection and Secure Web Gateway Security Efficacy Test Results

    Sponsored by: Cisco Umbrella

    AV-TEST is an independent research institute for IT security. In November and December 2019, AV-TEST performed a review of Cisco cloud security solutions alongside comparable offerings. The test was commissioned by Cisco to determine the malware protection and phishing block capabilities of all vendors. Read this report to see the results.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.