Internet Application Security Reports

What to Look for in Web Application Firewall Products
sponsored by TechTarget Security
EBOOK: In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

TechTarget Security

E-Guide: Best practices for pen testing Web applications
sponsored by TechTarget Security
EGUIDE: This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

TechTarget Security

Why Web Application Attacks are a Growing Threat to the Cloud
sponsored by Oracle Dyn
ESSENTIAL GUIDE: New research found that web application attacks present a significant threat to cloud environments. Find out what cybersecurity expert, Rob Shapland, has to say as he explains these risks and what enterprises should do about them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Oracle Dyn

Security risks that can affect your industry
sponsored by TechTarget Security
EGUIDE: As the threat landscape continues to evolve, the approaches to thwart them must also. But with emerging trends like social networking and the influx of mobile devices, ensuring adequate security is becoming more complex. In this expert resource, explore the security risks organizations face in today’s changing environment.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

TechTarget Security

How to prevent cross-site scripting attacks: Expert tactics
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

TechTarget Security

Taking Action to Secure Web Applications
sponsored by TechTarget Security
EGUIDE: This expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.
Posted: 03 May 2013 | Published: 03 May 2013

TechTarget Security

IBM Rational and the Financial Services Sector
sponsored by IBM
WHITE PAPER: Financial services institutions (FSIs) are under tight pressure to reduce cost and risk in the business while improving profitability and enhancing customer satisfaction. But achieving these goals can be a daunting task.  View this paper to explore a systematic approach and key recommendations that FSI should invest in to help tackle these goals.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

IBM

Web-Facing Applications: Mitigating Likely Web Application Threats
sponsored by TechTarget Security
EGUIDE: In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

TechTarget Security

E-Guide: Best Practices for Developing Secure Applications
sponsored by IBM
EGUIDE: This expert e-guide brought to you by SearchSecurity.com, explains the importance of integrating application security throughout the entire software development lifecycle and provides 4 tips that must be kept in mind on the application security forefront. Read on to uncover these tips and review an assessment of Web application security.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

IBM

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert
sponsored by Symantec Corporation
EGUIDE: This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

Symantec Corporation