Application firewall

Results: 701



#Item
11The Increasing Risk to Enterprise Applications Sponsored by Prevoty Independently conducted by Ponemon Institute LLC Publication Date: November 2015

The Increasing Risk to Enterprise Applications Sponsored by Prevoty Independently conducted by Ponemon Institute LLC Publication Date: November 2015

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
12Security-as-a-Service for Microservices-Based Cloud Applications Yuqiong Sun Penn State University Email:   Susanta Nanda

Security-as-a-Service for Microservices-Based Cloud Applications Yuqiong Sun Penn State University Email: Susanta Nanda

Add to Reading List

Source URL: www.cse.psu.edu

Language: English - Date: 2016-06-29 21:39:36
13PREVOTY APPLICATION SECURITY MONITOR AND PROTECT YOUR APPLICATIONS AT RUNTIME For hackers, the money is in applications and the databases they access. For enterprises, the distributed, dynamic nature of applications and

PREVOTY APPLICATION SECURITY MONITOR AND PROTECT YOUR APPLICATIONS AT RUNTIME For hackers, the money is in applications and the databases they access. For enterprises, the distributed, dynamic nature of applications and

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
14Veracode Runtime Protection

Veracode Runtime Protection

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-06-03 14:45:23
15CASE STUDY  Michigan State University implements language security technology to address runtime threat gap In recent years, Michigan State University (MSU) set out to make information security a critical priority, invit

CASE STUDY Michigan State University implements language security technology to address runtime threat gap In recent years, Michigan State University (MSU) set out to make information security a critical priority, invit

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
16Microsoft PowerPoint - VulnerabilityManagementInAnApplicationSecurityWorld_OWASPDC_20090805.ppt [Compatibility Mode]

Microsoft PowerPoint - VulnerabilityManagementInAnApplicationSecurityWorld_OWASPDC_20090805.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:23
17Optimizing ownCloud Security Tips & tricks for the security conscientious A recent study by Harris Interactive found that 38% of those surveyed admitted to using a file sharing solution that is not approved by IT leaving

Optimizing ownCloud Security Tips & tricks for the security conscientious A recent study by Harris Interactive found that 38% of those surveyed admitted to using a file sharing solution that is not approved by IT leaving

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-05-20 05:22:47
18Microsoft PowerPoint - DenimGroup_TurningThe Battleship_HowToBuildSecureSoftwareInLargeOrganizations_Content.ppt

Microsoft PowerPoint - DenimGroup_TurningThe Battleship_HowToBuildSecureSoftwareInLargeOrganizations_Content.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:31
19Microsoft PowerPoint - VulnerabilityManagementInAnApplicaitonSecurityWorld_OWASPMSP_20090316.ppt [Compatibility Mode]

Microsoft PowerPoint - VulnerabilityManagementInAnApplicaitonSecurityWorld_OWASPMSP_20090316.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:43
20Quick Reference Guide to PCI DSS 3.0 PCI DSS is the PAYMENT CARD INDUSTRY DATA SECURITY STANDARD. It is the information security standard for organizations that handle data for debit, credit, prepaid, e-purse, ATM, and P

Quick Reference Guide to PCI DSS 3.0 PCI DSS is the PAYMENT CARD INDUSTRY DATA SECURITY STANDARD. It is the information security standard for organizations that handle data for debit, credit, prepaid, e-purse, ATM, and P

Add to Reading List

Source URL: www.cogecopeer1.com

Language: English - Date: 2016-07-20 15:41:13