Web-based Application Security Reports

Bad bots make up a quarter of APAC's web traffic
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Bots that run automated tasks have been responsible for stealing personal information among other malicious activities in the Asia-Pacific region, study finds.
Posted: 25 May 2022 | Published: 25 May 2022

TechTarget ComputerWeekly.com

Web-Facing Applications: Mitigating Likely Web Application Threats
sponsored by TechTarget Security
EGUIDE: In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

TechTarget Security

Technical guide on Web Security Gateways
sponsored by TechTarget Security
EBOOK: Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.
Posted: 28 Apr 2011 | Published: 28 Apr 2011

TechTarget Security

Imperva's Web Application Attack Report
sponsored by Imperva
WHITE PAPER: Imperva’s Application Defense Center (ADC), as part of its ongoing Hacker Intelligence Initiative, studied web application attacks across 40 applications over a six month period. View this report to explore key findings and gain recommendations to help you better prioritize vulnerability remediation and web application projects.
Posted: 04 Apr 2012 | Published: 02 Jan 2012

Imperva

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert
sponsored by Symantec Corporation
EGUIDE: This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

Symantec Corporation

Presentation Transcript: Are your applications cloud-ready?
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript discusses the importance of application security, and describes the tools and processes you should be putting in place to ensure that your applications are secure as you move them to the cloud.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

IBM

Security risks that can affect your industry
sponsored by TechTarget Security
EGUIDE: As the threat landscape continues to evolve, the approaches to thwart them must also. But with emerging trends like social networking and the influx of mobile devices, ensuring adequate security is becoming more complex. In this expert resource, explore the security risks organizations face in today’s changing environment.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

TechTarget Security

Consumer Web Portals: Platforms at Significant Security Risk
sponsored by EMC Corporation
WHITE PAPER: This profile of business-to-consumer (B2C) security decision-makers in the financial services, healthcare, government, and online merchant sectors evaluates security around consumer portals based on market data and a custom study of the same audience.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation

PCI Council issues mobile application rules for software developers
sponsored by TechTarget Security
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security

How to Leverage Free Tools to Secure Web Apps
sponsored by Imperva
EGUIDE: Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Imperva