Application Security

Displaying 1-9 of 9 results

  • White Papers // Sep 2011

    Integrated Methods for Web Server Access Control

    This paper introduces methods for web server access control framework for web security, which protects against illegal computer access to resources by granting different layers of privileges to different user roles. The role-based access control features are analyzed and implemented in the most recent versions of Java Application server and...

    Provided By Application Security

  • White Papers // Sep 2010

    An Examination of Database Breaches at Higher Education Institutions

    Data breaches are dominating the headlines. Institutions and individuals are at increased risk of having their information compromised by hackers, insider malicious activity, or insider mistakes. Higher Education (Higher Ed) institutions have experienced a substantially large number of data breaches nearly 160 breaches and more than 2.3 million records breached...

    Provided By Application Security

  • White Papers // Aug 2009

    DbProtect and HIPAA Compliance

    The Health Insurance Portability and Accountability Act (HIPAA), passed by Congress in 1996, is designed to safeguard all forms of personal health information (PHI) to include patient identities, medical records, and health insurance information. By defending the patients' rights to have their health information kept private and provide control over...

    Provided By Application Security

  • White Papers // Jul 2009

    Defending Against New and Emerging Database Threats for 2009

    IT Security is constantly evolving and threats increasingly target the database. Organizations must be diligent in understanding these threats and mitigating their risk. Application Security, Inc., and their SHATTER research team have developed the industry's largest knowledgebase of database vulnerabilities. Relying on their extensive research, experience and knowledge enables company...

    Provided By Application Security

  • White Papers // Jul 2009

    Reviewing Database User Rights: Addressing Security, Risk and Compliance Challenges With Comprehensive Planning

    Today's business environment demands that a broad range of internal and external users require access to data. Users include internal employees, as well as external consultants, partners, and clients. New projects often require committees or teams, and employee roles are constantly changing. Organizations are faced with new and growing data...

    Provided By Application Security

  • White Papers // Jul 2009

    Addressing the Top 5 Database Vulnerabilities Plaguing Federal Agencies

    According to the recently released Verizon 2009 Data Breach Report, 285 million records were compromised in 2008. Agencies of the U.S. government such as The Pentagon, NASA, FAA, The Army, The Veterans Administration, and the Los Alamos National Laboratory have suffered data losses - either through inadvertent human error, insider...

    Provided By Application Security

  • White Papers // Jun 2009

    SQL Server Anti-Forensics: Techniques and Countermeasures

    This paper attempts to get ahead of the curve by discussing the techniques security professionals can use to perform forensics analysis after a database attack. It focus specifically on Microsoft SQL Server 2005, however the information presented is also relevant to other database versions. A discussion of forensics is not...

    Provided By Application Security

  • Webcasts // Jan 2009

    Integrated Database GRC: Increasing ROI Through Automation

    Despite the mounting and mandatory regulatory environment, organizations cannot afford to waste valuable resources in order to achieve database compliance. Manual processes bootstrap organizations, and AppSec and Archer present an automated Database GRC solution for the enterprise.

    Provided By Application Security

  • White Papers // Oct 2007

    Intrusion Detection and Security Auditing in Oracle

    Monitoring the database applications is a critical component of achieving a strong defense-in-depth around the sensitive data. However, to be efficient and effective one must use the right combination of tools. Monitoring should never replace other layers in the security stack, instead it should complement the existing pieces. Database intrusion...

    Provided By Application Security

  • White Papers // Oct 2007

    Intrusion Detection and Security Auditing in Oracle

    Monitoring the database applications is a critical component of achieving a strong defense-in-depth around the sensitive data. However, to be efficient and effective one must use the right combination of tools. Monitoring should never replace other layers in the security stack, instead it should complement the existing pieces. Database intrusion...

    Provided By Application Security

  • White Papers // Jul 2009

    Defending Against New and Emerging Database Threats for 2009

    IT Security is constantly evolving and threats increasingly target the database. Organizations must be diligent in understanding these threats and mitigating their risk. Application Security, Inc., and their SHATTER research team have developed the industry's largest knowledgebase of database vulnerabilities. Relying on their extensive research, experience and knowledge enables company...

    Provided By Application Security

  • White Papers // Jul 2009

    Reviewing Database User Rights: Addressing Security, Risk and Compliance Challenges With Comprehensive Planning

    Today's business environment demands that a broad range of internal and external users require access to data. Users include internal employees, as well as external consultants, partners, and clients. New projects often require committees or teams, and employee roles are constantly changing. Organizations are faced with new and growing data...

    Provided By Application Security

  • White Papers // Jun 2009

    SQL Server Anti-Forensics: Techniques and Countermeasures

    This paper attempts to get ahead of the curve by discussing the techniques security professionals can use to perform forensics analysis after a database attack. It focus specifically on Microsoft SQL Server 2005, however the information presented is also relevant to other database versions. A discussion of forensics is not...

    Provided By Application Security

  • White Papers // Jul 2009

    Addressing the Top 5 Database Vulnerabilities Plaguing Federal Agencies

    According to the recently released Verizon 2009 Data Breach Report, 285 million records were compromised in 2008. Agencies of the U.S. government such as The Pentagon, NASA, FAA, The Army, The Veterans Administration, and the Los Alamos National Laboratory have suffered data losses - either through inadvertent human error, insider...

    Provided By Application Security

  • White Papers // Aug 2009

    DbProtect and HIPAA Compliance

    The Health Insurance Portability and Accountability Act (HIPAA), passed by Congress in 1996, is designed to safeguard all forms of personal health information (PHI) to include patient identities, medical records, and health insurance information. By defending the patients' rights to have their health information kept private and provide control over...

    Provided By Application Security

  • Webcasts // Jan 2009

    Integrated Database GRC: Increasing ROI Through Automation

    Despite the mounting and mandatory regulatory environment, organizations cannot afford to waste valuable resources in order to achieve database compliance. Manual processes bootstrap organizations, and AppSec and Archer present an automated Database GRC solution for the enterprise.

    Provided By Application Security

  • White Papers // Sep 2010

    An Examination of Database Breaches at Higher Education Institutions

    Data breaches are dominating the headlines. Institutions and individuals are at increased risk of having their information compromised by hackers, insider malicious activity, or insider mistakes. Higher Education (Higher Ed) institutions have experienced a substantially large number of data breaches nearly 160 breaches and more than 2.3 million records breached...

    Provided By Application Security

  • White Papers // Sep 2011

    Integrated Methods for Web Server Access Control

    This paper introduces methods for web server access control framework for web security, which protects against illegal computer access to resources by granting different layers of privileges to different user roles. The role-based access control features are analyzed and implemented in the most recent versions of Java Application server and...

    Provided By Application Security