New & Notable
Web Application and Web 2.0 Threats News
July 18, 2014
With another round of patches for several serious Java flaws, Oracle's quarterly CPU showed that Java security problems are not receding.
July 01, 2014
A new online archive is allowing researchers to anonymously submit and expose cross-site scripting vulnerabilities uncovered across the Web.
June 17, 2014
With mobile, cloud and the Internet of Things driving massive API growth, experts say now is the time for API gateway technology to shine.
April 22, 2014
The 2014 Verizon data breach report shows a big rise in Web application attacks, with CMS frameworks and user credentials the most likely targets.
Web Application and Web 2.0 Threats Get Started
Bring yourself up to speed with our introductory content
Nick Lewis discusses the concept of sandboxing and how vendors are using network appliance sandboxes to boost network protection and malware defense. Continue Reading
API security is a growing enterprise concern. In the wake of recent high-profile breaches, discover how to alleviate the issues of insecure APIs. Continue Reading
Many websites are using HTTP Strict Transport Security (HSTS) to enhance application security, but is it really more effective than HTTPS? Continue Reading
Evaluate Web Application and Web 2.0 Threats Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Kevin Beaver discusses whether Tor usage should be allowed in the enterprise and if it still offers the anonymity it promises. Continue Reading
Can one Web browser better protect an enterprise from socially engineered malware than another? Expert Michael Cobb explains. Continue Reading
Uncover which ISP services enterprises should seek from their providers to improve cybersecurity and mitigate cyberattacks. Continue Reading
Manage Web Application and Web 2.0 Threats
Learn to apply best practices and optimize your operations.
Expert Nick Lewis explains how to provide a secure Web browsing experience for users when threats are no longer contained to certain parts of the Web. Continue Reading
After a plethora of Java and JRE security flaws, threats expert Nick Lewis weighs in on whether Java patching is now an exercise in futility. Continue Reading
Are employees using Tor to view blocked Web sites, or mining Bitcoins on corporate resources? Sinister or not, it needs to stop. Continue Reading
Problem Solve Web Application and Web 2.0 Threats Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Threats expert Nick Lewis explores whether Google's Transparency Report can be used to enhance blacklisting of malicious websites in the enterprise. Continue Reading
Application security expert Michael Cobb offers advice on how to secure content management systems like WordPress and Drupal. Continue Reading
Expert Michael Cobb discusses why known Java security vulnerabilities are on so many endpoints and how to contain them -- without updating Java. Continue Reading