Internet Applications Security Reports

E-Guide: Expert insights to application security testing and performance
sponsored by TechTarget Security
EGUIDE: Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle.
Posted: 11 Nov 2011 | Published: 11 Nov 2011

TechTarget Security

Web Application Security Insider's Edition
sponsored by TechTarget Security
EZINE: This Insider Edition will help you understand threats against Web applications, how you can help developers with security tools and training and how to deploy technologies such as Web application firewalls to keep your organization's Web presence safe.
Posted: 19 Sep 2013 | Published: 18 Sep 2013

TechTarget Security

Presentation Transcript: Client-Side Security Issues - The Twilight Zone of Web Security
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript discusses the various types of JavaScript client-side issues that exist in today’s Web applications, their prevalence on the internet and how to locate and fix them.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

IBM

ISM December 2012
sponsored by TechTarget Security
JOURNAL ARTICLE: In this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

TechTarget Security

Developing Richer Web based Applications
sponsored by QUALCOMM Incorporated
WHITE PAPER: This white paper describes industry developments that will lead the browser, JavaScript and the mobile processor to combine for web applications that perform on par with their native counterparts.
Posted: 27 Jun 2011 | Published: 27 Jun 2011

QUALCOMM Incorporated

Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business
sponsored by IBM
WEBCAST: This crucial webcast examines how you can protect existing and developing applications and provides some best practices for ensuring end-to-end application security.
Posted: 19 Jul 2013 | Premiered: Jul 19, 2013

IBM

SSL Certificate Management: Avoiding Common Mistakes
sponsored by GeoTrust, Inc.
EGUIDE: This expert E-Guide from SearchSecurity.com explores the common mistakes inherent to SSL certificate management and provides advice on how to avoid them. View now to learn more!
Posted: 09 May 2013 | Published: 09 May 2013

GeoTrust, Inc.

Presentation Transcript: Protecting Against Malware with Web Security Gateways and Services
sponsored by TechTarget Security
PRESENTATION TRANSCRIPT: Many organizations are moving malware protection to the Web and investing in Secure Web Gateways. This  transcript will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products.
Posted: 14 Mar 2012 | Published: 14 Mar 2012

TechTarget Security

E-Guide: Cloud computing security - Infrastructure issues
sponsored by TechTarget Security
EGUIDE: While cloud computing provides a number of compelling benefits, it's highly distributed. Understanding how cloud computing providers build services and manage data is critical as it can mean the difference between real cost savings and false economy.
Posted: 26 May 2011 | Published: 26 May 2011

TechTarget Security

Presentation Transcript: Focusing on What's Important with Your Web Application Security: Scanning and Testing
sponsored by IBM
PRESENTATION TRANSCRIPT: Web application security affects every business in some capacity. Regardless of the industry, there are certain Web security weaknesses you can’t afford to overlook and steps you must take to find them. In this presentation transcrip, expert Kevin Beaver shares what you need to know in order to find Web security vulnerabilities in your environment.
Posted: 14 Jan 2011 | Published: 14 Jan 2011

IBM