With new security features, is Dropbox safe for enterprises?

Web Application Security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • An enterprise strategy for Web application security threats

    People Security founder Hugh Thompson reviews the tools and tactics, from security assessments to Web application firewalls, that are essential to an application security strategy. 

  • Scanning with N-Stalker offers basic Web application security assessment

    In this month's SearchSecurity.com screencast video demo, Peter Giannoulis of TheAcademyHome.com and TheAcademyPro.com introduces N-Stalker, a free Web application security assessment scanner available for Windows. 

  • How a corporate Twitter policy can combat social network threats

    Despite the recent security risks, there is no reason to completely shut down Twitter use in the enterprise. There are, however, important policy controls and technologies that need to be put in place before you let the microblogging site into your o... 

  • How to find and stop automated SQL injection attacks

    Automated SQL injection worms use search engines to filter through vulnerable Web servers. In this tip, Patrick Szeto explains how to keep your website off of the malware's radar. 

  • Cloud compliance: How to manage SaaS risk

    While Software as a Service (SaaS) can cut costs, there are definite security concerns to be aware of, including compliance issues. What's the best way to make sure that data is safe and audit-ready on the provider's server? Expert Joel Dubin gives a... 

  • New defenses for automated SQL injection attacks

    By automating SQL injection attacks, hackers have found a way to expedite the process of finding and exploiting vulnerable websites. The old defense of testing and patching Web app code may not be enough to stop the threat. Michael Cobb explains how ... 

  • Webmail security: Best practices for data protection

    Webmail has become a popular choice for enterprises looking to provide users with email access outside the office, but deployment of any Web-based email system presents a unique set of security challenges. In this Messaging Security School tip, Sandr... 

  • Tracing malware's steps with RE:Trace

    As application monitoring and troubleshooting becomes more difficult, security professionals are relying on the use of system tools to ease the process. In this tip, contributor Noah Schiffman gives an overview of the new RE:trace framework, and disc... 

  • Web scanning and reporting best practices

    Implementing a solid Web scanning routine is a key way to avoid corporate Web application attacks. And with industry requirements such as PCI DSS, performing vulnerability scans are also required to stay compliant. In this tip, contributor Joel Dubin... 

  • Static and dynamic code analysis: A key factor for application security success

    In this tip, Michael Cobb examines how static and dynamic code analysis processes can help organizations identify coding flaws, mitigate Web application-based attacks and offers three ways to improve your organizations overall application security st...