Category Archives: Application Security

HITB Magazine – SVFORTH: A Forth for Security Analysis and Visualization

In this issue of HITB Magazine, you will find information on network security, database security, application security, computer forensics, computer security and mobile security. Also included in this issue are the following articles: Practical Attacks Against Encrypted VoIP Communications Hunting for OS X Rootkits in Memory Dynamic Tamper – Evidence […]

Read More

Authentication Solutions Through Keystroke Dynamics

Provides an in-depth study of keystroke dynamics and how it’s used today to fully secure enterprises and prevent fraud. Achieving network and application security in the face of an ever-changing population of customers, suppliers, partners, and employees requires fully verifying user identities. It’s no longer effective to rely on user […]

Read More

Best Practices for Mobile Application Lifecycle Management

There’s an app for that, but is it secure? Home-grown enterprise apps improve productivity, business partnerships, customer satisfaction and bottom-line performance.Mobile Application Lifecycle Management (MALM) is the key to ensuring the protection of apps and associated data by integrating security throughout the end to end process. Download this white paper […]

Read More

Six Essential Elements of Web Application Security

An introduction to defending your business against today’s most common cyber attacks. Like all competitive businesses, your application developers and operation teams are constantly under pressure to move quickly. Everybody wants their application security efforts to be effective, but only if they don’t unduly impede workflow or drive up costs. […]

Read More

Web Application Security; How to Minimize Prevalent Risk of Attacks

Vulnerabilities in web applications are now the largest vector of enterprise security attacks. Stories about exploits that compromise sensitive data frequently mention culprits such as “cross-site scripting,” “SQL injection,” and “buffer overflow.” Vulnerabilities like these fall often outside the traditional expertise of network security managers.To help you understand how to […]

Read More

Entitlement Management Meets the Network

Learn how large organization CIOs should prepare for the inevitable migration of Access Management from applications to the network. How do CIOs make sure that credentialed users can access the IT resources they need while hackers and criminals are locked out? In this white paper, Jon Oltsik, Senior Analyst at […]

Read More

The Evolution of Application Security in Online Banking

The world’s largest online-only banks have set the industry standard in application security. Find out what they’re doing right. Has online banking actually become safer than offline banking? In this eye-opening report, read how online-only banks are utilizing Software Development Life Cycles that makes them more unattractive (and resistant!) to […]

Read More

Six Essential Elements of Web Application Security

An introduction to defending your business against today’s most common cyber attacks. Like all competitive businesses, your application developers and operation teams are constantly under pressure to move quickly. Everybody wants their application security efforts to be effective, but only if they don’t unduly impede workflow or drive up costs. […]

Read More

Intelligent Layer 7 DoS and Brute Force Protection for Web Applications

Learn about a web application security solution that offers the detailed control and protection from both layer 7 DoS and Bruce Force attacks. Both Denial-of-Service (DoS) and Brute Force Attacks have existed for many years, and many network devices tout the ability to withstand them. However, most of today’s DoS […]

Read More

Application Security in the Cloud

Learn about a proven solution that provides the security, intelligence, and performance that today’s dynamic infrastructure demands. Whether critical applications live in the cloud, in the data center, or in both, organizations need a strategic point of control for application security. This White Paper highlights the advantages of a F5 […]

Read More

Streamlining Oracle Web Application Access Control

Web application security is critical–the data that web servers and their back-end databases house is invaluable to an enterprise. An organization must be able to control who can access their resources and when, as well as audit that information. F5 BIG-IP Access Policy Manager (APM), in conjunction with Oracle Access […]

Read More

Close your account?

Your account will be closed and all data will be permanently deleted and cannot be recovered. Are you sure?