Is it time to ban dangerous third-party apps?

Application Attacks (Buffer Overflows, Cross-Site Scripting)

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Black box and white box testing: Which is best?

    There's no question that testing application security is essential for enterprises, but which is better: black box security testing or white box security testing? Learn more in this expert tip. 

  • PCI management: The case for Web application firewalls

    Expert Michael Cobb lays out the compliance and security benefits of Web application firewalls. 

  • Vulnerability test methods for application security assessments

    Learn what to do when you have a huge portfolio of potentially insecure applications, limited resources and an overwhelming sense of urgency. 

  • Future security threats: Enterprise attacks of 2009

    Will organizations be ready for next year's enterprise security threats? Expert John Strand reviews what's in store for 2009, including new weapons, old vulnerabilities, and new takes on old attack techniques. 

  • How to prevent clickjacking attacks with security policy, not technology

    Clickjacking, an emerging hacker technique similar to cross-site scripting, tricks a user into executing malicious commands on a seemingly legitimate or innocent website. John Strand reviews how the attack works, how it compares to cross-site-scripti... 

  • How to implement and enforce a social networking security policy

    For a new generation of employees entering the workforce, social networking isn't a luxury, it's a necessity. Yet not all enterprises understand that failing to consider social networking security can lead to unfortunate consequences. David Sherry ex... 

  • New blacklists: Highly predictive or hardly worth it?

    Renowned security expert Marcus Ranum once declared that blacklists were one of the most misguided ideas in computer security. But what about a new, more customized approach called highly predictive blacklists? John Strand takes a look at the emergin... 

  • New defenses for automated SQL injection attacks

    By automating SQL injection attacks, hackers have found a way to expedite the process of finding and exploiting vulnerable websites. The old defense of testing and patching Web app code may not be enough to stop the threat. Michael Cobb explains how ... 

  • Stopping malware in its tracks

    There's no such thing as a cure-all for stopping malware. Effective malware defense demands a keen attention to detail and careful planning. Expert Lenny Zeltser offers a malware-defense blueprint every enterprise can follow, plus plenty of free tool... 

  • Making the case for Web application vulnerability scanners

    If a Web application scanner can find common SQL injection flaws, cross-site scripting vulnerabilities, buffer overflows and dangerous backdoors, then why aren't more enterprises using them? In this tip, Michael Cobb not only examines where the tools...