Web-based Application Security Reports

Bad bots make up a quarter of APAC's web traffic
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Bots that run automated tasks have been responsible for stealing personal information among other malicious activities in the Asia-Pacific region, study finds.
Posted: 25 May 2022 | Published: 25 May 2022

TechTarget ComputerWeekly.com

 Five tips to reduce risk from modern web threats
sponsored by Sophos
WHITE PAPER: User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.
Posted: 12 Oct 2010 | Published: 06 Oct 2010

Sophos

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

The Token is Dead. Long Live the Token
sponsored by SafeNet, Inc.
WEBCAST: View this webcast as speakers discuss hardware and software-based authentication, extending authentication to cloud-based applications, credentialing and managing consumer-grade mobile devices while minimizing security risks, and offer best practices for striking the balance between security, ease of use, manageability and cost
Posted: 17 Aug 2011 | Premiered: Aug 17, 2011

SafeNet, Inc.

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert
sponsored by Thawte Inc.
EGUIDE: This e-guide from SearchSecurity.com outlines how to address web app design flaws and fight these weaknesses once and for all.
Posted: 16 Jul 2013 | Published: 16 Jul 2013

Thawte Inc.

Tolly Test Report: IBM Security Web Gateway Appliance
sponsored by IBM
WHITE PAPER: This white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.
Posted: 05 May 2014 | Published: 25 Sep 2013

IBM

E-Guide: Building a Security Toolkit to Protect Against the Latest Web 2.0 Threats
sponsored by TechTarget Security
EGUIDE: This expert e-guide provides an in-depth overview of the latest Web 2.0 security threats and offers technical advice on how to defend against them.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

TechTarget Security

API Security Now
sponsored by TechTarget Security
EBOOK: Secure APIs are possible but not easy. This guide outlines the source for security risks with application program interfaces, and how to eliminate them.
Posted: 16 Nov 2015 | Published: 16 Nov 2015

TechTarget Security

Thwarting Sophisticated Attacks with Today’s Firewalls
sponsored by TechTarget Security
EGUIDE: This expert resource explores modern network security, offering key insight into fighting today’s sophisticated threats as well as the differences between next-generation firewall (NGFW) and unified threat management (UTM).
Posted: 17 Feb 2012 | Published: 17 Feb 2012

TechTarget Security

HP Fortify on Demand
sponsored by Hewlett Packard Enterprise
DATA SHEET: Access this data sheet to discover an on-demand solution that tests the security of software quickly, accurately, and affordably.
Posted: 18 Aug 2014 | Published: 31 Jul 2013

Hewlett Packard Enterprise