Breach Security

Displaying 1-40 of 40 results

  • Webcasts // Jan 2010

    WebDefend and the CWE/SANS Top 25 Most Dangerous Programming Errors 2010

    This webcast is mainly about Web Defend and the CWE/SANS Top 25 of the Most Dangerous Programming Errors that happened in the year 2010.the CWE & SANS is the leader in their domain has been asked by the other companies to construct a list of the list of the top...

    Provided By Breach Security

  • Webcasts // Jan 2010

    Top Web Incidents and Trends of 2009 and Predictions for 2010

    Have your organization come under any sort of attack from the hackers, or attack through any other way in the past. Is your organization worried about the security of your information, and the threat that might appear in the year 2010.Then this is the webcast that would help the attendee...

    Provided By Breach Security

  • White Papers // Jul 2009

    Scraping, Denial of Service, and Brute Force Attacks! Oh My!: Identifying and Controlling Automated Clients

    Anti-Automation defenses are critical in today's web application security landscape. Breach Security's product line is uniquely positioned to help organizations address these automated types of attacks. Only through the combination of all of these capabilities can organizations gain true protections against these threats. Many systems will allow the use of...

    Provided By Breach Security

  • Case Studies // Jun 2009

    Universal Weather and Aviation, Inc. Selects WebDefend to Protect Web Applications, Analyze Web Threats

    Universal Weather and Aviation, Inc. (Universal) began providing weather briefings specifically for corporate aviation in 1959. The confidentiality, integrity and availability of these assets are critical to the company's daily operations and long-term viability. As such, Universal's IT Security team must ensure that its information assets are protected against the...

    Provided By Breach Security

  • White Papers // Jun 2009

    The Good, Bad and Necessary: The Complete Guide to PCI 6.6 Success

    It seems that IT administrators and security professionals are always receiving notification of new rules, regulations and compliance codes that fall under their purview. And just when the necessary adjustments have been made, priorities shifted and new technology purchased, the rules are changed - yet again. The Payment Card Industry...

    Provided By Breach Security

  • Case Studies // May 2009

    Epping Forest District Council Turns to Breach WebDefend to Protect Customer Data, Obtain Application Security Solutions

    Epping Forest District Council provides a range of services to its residents, many of which are statutory. The Council offers services relating to business properties, emergency planning, housing, environmental health, land drainage, and recycling and waste management, among others. As a government organization, Epping Forest District Council sought to protect...

    Provided By Breach Security

  • White Papers // May 2009

    Detecting Remote File Inclusion Attack

    The biggest challenge standing in front of security experts is to detect attack that cannot easily be detected using signatures; Remote File Inclusion (RFI) is a good example of such as attack. This paper tries to present the challenges of accurately detecting RFI attacks. In order to achieve detection of...

    Provided By Breach Security

  • Case Studies // Apr 2009

    Pegasus Solutions Satisfies PCI Compliance Requirements, Remediates Application Defects Using WebDefend

    As a pioneer in the travel technology industry, Pegasus Solutions introduced the world's first electronic switch connecting travel providers and distributors, which opened up a new world of opportunity for the travel industry. Creating a wider, more accessible market for travel providers and distributors, Pegasus has become the largest third-party...

    Provided By Breach Security

  • White Papers // Apr 2009

    The Downward Spiral: Failures in Your Web Applications

    Anytime when a web application is not performing as expected, or it's the integrity that is compromised, the outbound flow needs to be analyzed to fully understand what information is being given up. Output is the best indicator of a vulnerability and threat. Applications integrity is the key to its...

    Provided By Breach Security

  • Case Studies // Mar 2009

    Ashland University Selects WebDefend as Critical Component in Overall Threat Mitigation and Event Correlation Model

    Ashland University is a mid-sized regional teaching university, historically related to the Brethren Church. The university sought a Web Application Firewall (WAF) as part of its overall threat mitigation and event correlation model. After evaluating several appliances, Ashland decided on Breach Security's WebDefend for its feature set, including host-based agents,...

    Provided By Breach Security

  • White Papers // Feb 2009

    The Web Hacking Incidents Database 2008: Annual Report

    The Web Hacking Incident Database (WHID) is a project dedicated to maintaining a list of web application-related security incidents. The WHID's purpose is to serve as a tool for raising awareness of web application security problems and provide information for statistical analysis of web application security incidents. Unlike other resources...

    Provided By Breach Security

  • White Papers // Feb 2009

    The Web Hacking Incidents Database 2008

    While financial gain is certainly a big driver for web hacking, ideological hacking cannot be ignored. Government and other organizations especially suffer from ideological hacking. Internet related organizations, especially hosting providers, are suffering from more and more serious for profit hacking incidents. Financial organizations are either starting to be targeted...

    Provided By Breach Security

  • White Papers // Jan 2009

    WAF Virtual Patching Challenge: Securing WebGoat With ModSecurity

    This paper presents the technical details behind a virtual patch, which is a critical protection function provided by Web Application Firewalls (WAFs). A virtual patch is a powerful, agile mitigation strategy to quickly help protect vulnerable web applications from remote compromise. During the course of this whitepaper, it evaluates a...

    Provided By Breach Security

  • Case Studies // Jan 2009

    PopCap Games Inc. Achieves PCI 6.6 Compliance, Protects Against Application Defects Using Breach Security WebDefend

    As the leading multi-platform provider of "Casual" computer games, PopCap Games is the only casual games developer with leading market share across all major sales channels, including web portals, retail stores, consoles, mobile phones and MP3 players. Its games have been downloaded more than one billion times by consumers worldwide,...

    Provided By Breach Security

  • Case Studies // Jan 2009

    Casual Male Retail Group Attains PCI Compliance Affordably Using Breach Security's WebDefend

    Casual Male Retail Group, Inc. is the largest specialty retailer of big and tall men's apparel, with over 520 store locations throughout the United States, London, England and Canada, along with substantial e-commerce and catalog operations. Casual Male operates under the trade names of Casual Male XL, Rochester Big &...

    Provided By Breach Security

  • Case Studies // Jan 2009

    Mint Technology Deploys ModSecurity Pro M1100 From Breach Security to Meet PCI Requirement 6.6

    Mint Technology Corporation ("Mint") is a pioneer in prepaid financial products and services and is Canada's first provider of reloadable prepaid credit card programs. As a MasterCard Member Service Provider, Mint works with financial partners to customize prepaid credit card programs that are tailored to an organization's needs. Mint has...

    Provided By Breach Security

  • Case Studies // Jan 2009

    JSC Norvik Banka Secures Web Applications With Breach Security's WebDefend

    JSC Norvik Banka was established in April 1992 to serve both consumer and corporate financial clients with banking services that include cash and settlement, lending and acceptance of deposits, and the renting of safe deposit boxes. The bank is based in Latvia and has more than 100 individual branches while...

    Provided By Breach Security

  • Case Studies // Jan 2009

    Reed.co.uk Enlists Brookcourt Solutions to Provide Breach WebDefend for Enhanced Online User Experience and Protection of a Distinguished Brand

    The UK's leading specialist recruitment and HR services provider, Reed has been providing recruitment solutions to employers and jobseekers for 50 years. Business was booming; with unprecedented levels of site activity a robust web application security solution to monitor, protect and report on activity surrounding reed.co.uk's extensive web site and...

    Provided By Breach Security

  • Case Studies // Jan 2009

    Barbon Insurance Group Protects Customer Data and Brand, Meet PCI Compliance Using Breach Security's WebDefend

    Barbon Insurance Group is one of the UK's leading names in property insurance. The company is comprised of a number of individual brands, including Cadogan Keelan Westall, Deacon, Farr, Keelan Westall, HomeLet and Letsure, which are united by a commitment to insurance quality and excellence. Barbon brands and the values...

    Provided By Breach Security

  • Case Studies // Jan 2009

    Ochsner Health System Protects Private Health Information Online Using Breach Security's WebDefend

    The Ochsner Health System includes seven hospitals and more than 35 health centers, employing more than 11,000 employees system-wide. Electronic medical records are available from any Ochsner location, allowing for consistent patient care. With HIPAA and other patient privacy measures ki place, healthcare organizations like Ochsner are under increasing scrutiny...

    Provided By Breach Security

  • Case Studies // Jan 2009

    Honeywell Protects Against Web Threats, Achieves Significant Cost Savings Using Breach Security WebDefend

    Global companies like Honeywell are often targeted at the web application layer. As new online threats emerged, Honeywell sought solutions to protect its extensive web layer. Specifically, Honeywell wanted protection against threats listed on the Open Web Application Security Project's (OWASP) Top Ten list, which includes cross-site scripting and SQL...

    Provided By Breach Security

  • Case Studies // Jan 2009

    Overstock.com Keeps Customer Security and Compliance Top Priority Using Breach Security WebDefend

    In 1999, Overstock.com brought the outlet mall to the consumer via the Internet, providing brand-name products found in traditional retail stores at deep discounts. The Salt Lake City-based company is now a leading online retailer offering its customers an opportunity to shop for bargains conveniently, while offering its suppliers an...

    Provided By Breach Security

  • Case Studies // Jan 2009

    Sequoia Retail Systems Achieves PCI 6.6 Compliance Using Breach Security's WebDefend

    Sequoia Retail Systems. Inc. is the leading independent provider of comprehensive point-of-sale, inventory control, ecommerce and textbook management systems to colleges and universities throughout the U.S. Prestigious educational institutions, including Duke University, University of Texas, Syracuse University and the Naval Academy, use Sequoia's products and services. Hosting e-commerce systems and...

    Provided By Breach Security

  • Case Studies // Jan 2009

    Sovereign Bank Protects Web Applications With WebDefend Application Firewall

    Sovereign Bancorp, Inc., the parent company of Sovereign Bank, is an $82 billion financial institution with principal markets in the Northeast United States. Sovereign Bank offers a broad array of financial services and products including retail banking, business and corporate banking, cash management, capital markets, wealth management, and insurance. Being...

    Provided By Breach Security

  • White Papers // Jan 2009

    WebDefend and the CWE/SANS Top 25 Most Dangerous Programming Errors

    The WebDefend web application firewall is an advanced web application security solution that offers customized, behavior-based security for every protected application. WebDefend uses a patent-pending profiling system and multiple, collaborative detection engines to provide complete protection for applications, keep the organization's confidential information safe and ensure the flow of mission-critical...

    Provided By Breach Security

  • Webcasts // Jan 2009

    The Web Hacking Incidents Database 2009: Bi-Annual Report

    The much anticipated Web Hacking Incidents Database (WHID) 2009 Bi-Annual Report is ready for download. The WHID project is dedicated to maintaining a record of web application-related security incidents. The WHID's purpose is to serve as a tool for raising awareness of web application security problems and provide information for...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Outsmarting Tomorrow's Hackers Today

    Network IDS/IPS and first-generation Web Application Firewalls (WAFs) don't protect against today's sophisticated web application threats, such as cross-site scripting, injection flaws and other vulnerabilities listed on the OWASP Top 10. IT professionals need the necessary visibility into their web application security to understand how applications are being used, when...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Anti-Automation: Identifying and Controlling Automated Clients

    Brute force. Denial of service. Bot attacks. Are automated programs attacking the web applications? An overwhelming number of companies can't identify when automated attackers are threatening their system. This webcast outlines what insufficient anti-automation can mean to the company.

    Provided By Breach Security

  • Webcasts // Jan 2009

    The Perils of Cross-Site Scripting (XSS)

    Cross-site Scripting (XSS) attacks are universally seen as the #1 security vulnerability facing web applications. Don't wait another today to learn how protect the organization. The presenter of this webcast gives an overview on XSS (techniques, consequences and vulnerabilities and give real-world examples and offensive techniques aimed at short circuiting...

    Provided By Breach Security

  • Webcasts // Jan 2009

    The Web Hacking Incidents Database (WHID): Trends in Web Application Security

    What are the emerging trends in web application security? The presenter of this webcast will provide an overview of web application security and valuable industry tools. Many organizations today have a difficult time finding reliable data on web attacks and web defects because the number of web attacks reported is...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Report on Application Security for the Federal Industry

    Are the IDS logs providing the security team with overwhelming data? Ever noticed clear attempts at cyber Espionage? Businesses in every industry are affected by web application security - even at the federal level. Rsignia has 20 years of experience in the federal industry and they will share examples of...

    Provided By Breach Security

  • Webcasts // Jan 2009

    WebDefend and the OWASP Top Ten

    With all the web application attacks and vulnerabilities surfacing - it is hard to know where to focus the security efforts. Luckily, OWASP produces the OWASP Top Ten list to raise awareness of web application security. This list is an outstanding starting point for prioritizing web application security attacks and...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Web Application Firewall: A Cost Effective Way to Improve Web Application Security

    With all the options out there today, it's hard to know who to trust. This webcast will help to find cost effective ways to improve the web application security. The presenter of this webcast will throw light on the latest developments in the industry and advice on choosing the right...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Web Hacking Incidents Database (WHID): 2008 Report

    The presenter of this webcast throws light on the challenges of risk analysis for web applications. The presenter also talks about the available vulnerability resources.

    Provided By Breach Security

  • Webcasts // Jan 2009

    Your Guide to PCI Compliance v1.2

    What is the best way to become PCI Compliant and protect web applications? The attendee of this webcast will discover the right solution for the organization and learn the fundamentals of PCI Compliance. The presenter will cover the latest trends in the industry and information regarding the costs of not...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Web Application Integrity Series: SQL Injection

    Concerned with the abundance of emerging web application attacks? This webcast delves into one of the largest web application threats out there, SQL injection, and prepares one with the information needed to keep the company safe. The attendee will gain conceptual overview of SQL injections. The presenter shows how widespread...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Why Security Shouldn't Take a Back Seat to PCI

    The attendee of this webcast will get an overview of PCI DSS and the 6.6 requirements, but more importantly attendee will learn about the risks associated with the storage of sensitive data and the ways in which it can be protected.

    Provided By Breach Security

  • White Papers // Oct 2008

    Guide to PCI Compliance for Web Applications: Updated for Version 1.2 of the Payment Card Industry Data Security Standard

    On the surface, the Payment Card Industry (PCI) Data Security Standard (DSS) reads as a series of do this, don't do that" absolutes. Vet, in three areas, the standard gives organizations some flexibility in their options. The most critical of these choices lies in Requirement 8.6. This section states that...

    Provided By Breach Security

  • White Papers // Sep 2008

    Changing the Game: The New Security Threats Facing Your Organization

    This paper discusses the latest web application challenges, organizational considerations, business costs associated with security issues and tips to maintain the integrity of an organization's web applications. In addition, readers will gain an understanding of the top web application attacks, such as SQL injection, cross-site scripting, session hijacking and scraping,...

    Provided By Breach Security

  • White Papers // Sep 2008

    The Business Case for Web Application Firewalls

    Web application firewalls offer a variety of business benefits such as rapid application deployment, significant cost savings and increased communication between development and security teams. In addition, they also provide security advantages that complement secure coding initiatives, vulnerability scanning efforts and network IDS/IPS. As a result, a web application firewall...

    Provided By Breach Security

  • White Papers // Jul 2009

    Scraping, Denial of Service, and Brute Force Attacks! Oh My!: Identifying and Controlling Automated Clients

    Anti-Automation defenses are critical in today's web application security landscape. Breach Security's product line is uniquely positioned to help organizations address these automated types of attacks. Only through the combination of all of these capabilities can organizations gain true protections against these threats. Many systems will allow the use of...

    Provided By Breach Security

  • White Papers // Jun 2009

    The Good, Bad and Necessary: The Complete Guide to PCI 6.6 Success

    It seems that IT administrators and security professionals are always receiving notification of new rules, regulations and compliance codes that fall under their purview. And just when the necessary adjustments have been made, priorities shifted and new technology purchased, the rules are changed - yet again. The Payment Card Industry...

    Provided By Breach Security

  • White Papers // Apr 2009

    The Downward Spiral: Failures in Your Web Applications

    Anytime when a web application is not performing as expected, or it's the integrity that is compromised, the outbound flow needs to be analyzed to fully understand what information is being given up. Output is the best indicator of a vulnerability and threat. Applications integrity is the key to its...

    Provided By Breach Security

  • White Papers // Feb 2009

    The Web Hacking Incidents Database 2008: Annual Report

    The Web Hacking Incident Database (WHID) is a project dedicated to maintaining a list of web application-related security incidents. The WHID's purpose is to serve as a tool for raising awareness of web application security problems and provide information for statistical analysis of web application security incidents. Unlike other resources...

    Provided By Breach Security

  • White Papers // Jan 2009

    WebDefend and the CWE/SANS Top 25 Most Dangerous Programming Errors

    The WebDefend web application firewall is an advanced web application security solution that offers customized, behavior-based security for every protected application. WebDefend uses a patent-pending profiling system and multiple, collaborative detection engines to provide complete protection for applications, keep the organization's confidential information safe and ensure the flow of mission-critical...

    Provided By Breach Security

  • White Papers // Sep 2008

    Changing the Game: The New Security Threats Facing Your Organization

    This paper discusses the latest web application challenges, organizational considerations, business costs associated with security issues and tips to maintain the integrity of an organization's web applications. In addition, readers will gain an understanding of the top web application attacks, such as SQL injection, cross-site scripting, session hijacking and scraping,...

    Provided By Breach Security

  • White Papers // Sep 2008

    The Business Case for Web Application Firewalls

    Web application firewalls offer a variety of business benefits such as rapid application deployment, significant cost savings and increased communication between development and security teams. In addition, they also provide security advantages that complement secure coding initiatives, vulnerability scanning efforts and network IDS/IPS. As a result, a web application firewall...

    Provided By Breach Security

  • White Papers // Oct 2008

    Guide to PCI Compliance for Web Applications: Updated for Version 1.2 of the Payment Card Industry Data Security Standard

    On the surface, the Payment Card Industry (PCI) Data Security Standard (DSS) reads as a series of do this, don't do that" absolutes. Vet, in three areas, the standard gives organizations some flexibility in their options. The most critical of these choices lies in Requirement 8.6. This section states that...

    Provided By Breach Security

  • Case Studies // Jan 2009

    Reed.co.uk Enlists Brookcourt Solutions to Provide Breach WebDefend for Enhanced Online User Experience and Protection of a Distinguished Brand

    The UK's leading specialist recruitment and HR services provider, Reed has been providing recruitment solutions to employers and jobseekers for 50 years. Business was booming; with unprecedented levels of site activity a robust web application security solution to monitor, protect and report on activity surrounding reed.co.uk's extensive web site and...

    Provided By Breach Security

  • Case Studies // Jun 2009

    Universal Weather and Aviation, Inc. Selects WebDefend to Protect Web Applications, Analyze Web Threats

    Universal Weather and Aviation, Inc. (Universal) began providing weather briefings specifically for corporate aviation in 1959. The confidentiality, integrity and availability of these assets are critical to the company's daily operations and long-term viability. As such, Universal's IT Security team must ensure that its information assets are protected against the...

    Provided By Breach Security

  • Case Studies // May 2009

    Epping Forest District Council Turns to Breach WebDefend to Protect Customer Data, Obtain Application Security Solutions

    Epping Forest District Council provides a range of services to its residents, many of which are statutory. The Council offers services relating to business properties, emergency planning, housing, environmental health, land drainage, and recycling and waste management, among others. As a government organization, Epping Forest District Council sought to protect...

    Provided By Breach Security

  • Case Studies // Apr 2009

    Pegasus Solutions Satisfies PCI Compliance Requirements, Remediates Application Defects Using WebDefend

    As a pioneer in the travel technology industry, Pegasus Solutions introduced the world's first electronic switch connecting travel providers and distributors, which opened up a new world of opportunity for the travel industry. Creating a wider, more accessible market for travel providers and distributors, Pegasus has become the largest third-party...

    Provided By Breach Security

  • Case Studies // Mar 2009

    Ashland University Selects WebDefend as Critical Component in Overall Threat Mitigation and Event Correlation Model

    Ashland University is a mid-sized regional teaching university, historically related to the Brethren Church. The university sought a Web Application Firewall (WAF) as part of its overall threat mitigation and event correlation model. After evaluating several appliances, Ashland decided on Breach Security's WebDefend for its feature set, including host-based agents,...

    Provided By Breach Security

  • Case Studies // Jan 2009

    Barbon Insurance Group Protects Customer Data and Brand, Meet PCI Compliance Using Breach Security's WebDefend

    Barbon Insurance Group is one of the UK's leading names in property insurance. The company is comprised of a number of individual brands, including Cadogan Keelan Westall, Deacon, Farr, Keelan Westall, HomeLet and Letsure, which are united by a commitment to insurance quality and excellence. Barbon brands and the values...

    Provided By Breach Security

  • Case Studies // Jan 2009

    PopCap Games Inc. Achieves PCI 6.6 Compliance, Protects Against Application Defects Using Breach Security WebDefend

    As the leading multi-platform provider of "Casual" computer games, PopCap Games is the only casual games developer with leading market share across all major sales channels, including web portals, retail stores, consoles, mobile phones and MP3 players. Its games have been downloaded more than one billion times by consumers worldwide,...

    Provided By Breach Security

  • Case Studies // Jan 2009

    Casual Male Retail Group Attains PCI Compliance Affordably Using Breach Security's WebDefend

    Casual Male Retail Group, Inc. is the largest specialty retailer of big and tall men's apparel, with over 520 store locations throughout the United States, London, England and Canada, along with substantial e-commerce and catalog operations. Casual Male operates under the trade names of Casual Male XL, Rochester Big &...

    Provided By Breach Security

  • Case Studies // Jan 2009

    Ochsner Health System Protects Private Health Information Online Using Breach Security's WebDefend

    The Ochsner Health System includes seven hospitals and more than 35 health centers, employing more than 11,000 employees system-wide. Electronic medical records are available from any Ochsner location, allowing for consistent patient care. With HIPAA and other patient privacy measures ki place, healthcare organizations like Ochsner are under increasing scrutiny...

    Provided By Breach Security

  • Case Studies // Jan 2009

    Honeywell Protects Against Web Threats, Achieves Significant Cost Savings Using Breach Security WebDefend

    Global companies like Honeywell are often targeted at the web application layer. As new online threats emerged, Honeywell sought solutions to protect its extensive web layer. Specifically, Honeywell wanted protection against threats listed on the Open Web Application Security Project's (OWASP) Top Ten list, which includes cross-site scripting and SQL...

    Provided By Breach Security

  • Case Studies // Jan 2009

    Overstock.com Keeps Customer Security and Compliance Top Priority Using Breach Security WebDefend

    In 1999, Overstock.com brought the outlet mall to the consumer via the Internet, providing brand-name products found in traditional retail stores at deep discounts. The Salt Lake City-based company is now a leading online retailer offering its customers an opportunity to shop for bargains conveniently, while offering its suppliers an...

    Provided By Breach Security

  • Case Studies // Jan 2009

    Sequoia Retail Systems Achieves PCI 6.6 Compliance Using Breach Security's WebDefend

    Sequoia Retail Systems. Inc. is the leading independent provider of comprehensive point-of-sale, inventory control, ecommerce and textbook management systems to colleges and universities throughout the U.S. Prestigious educational institutions, including Duke University, University of Texas, Syracuse University and the Naval Academy, use Sequoia's products and services. Hosting e-commerce systems and...

    Provided By Breach Security

  • Webcasts // Jan 2009

    The Web Hacking Incidents Database 2009: Bi-Annual Report

    The much anticipated Web Hacking Incidents Database (WHID) 2009 Bi-Annual Report is ready for download. The WHID project is dedicated to maintaining a record of web application-related security incidents. The WHID's purpose is to serve as a tool for raising awareness of web application security problems and provide information for...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Outsmarting Tomorrow's Hackers Today

    Network IDS/IPS and first-generation Web Application Firewalls (WAFs) don't protect against today's sophisticated web application threats, such as cross-site scripting, injection flaws and other vulnerabilities listed on the OWASP Top 10. IT professionals need the necessary visibility into their web application security to understand how applications are being used, when...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Anti-Automation: Identifying and Controlling Automated Clients

    Brute force. Denial of service. Bot attacks. Are automated programs attacking the web applications? An overwhelming number of companies can't identify when automated attackers are threatening their system. This webcast outlines what insufficient anti-automation can mean to the company.

    Provided By Breach Security

  • Webcasts // Jan 2009

    The Perils of Cross-Site Scripting (XSS)

    Cross-site Scripting (XSS) attacks are universally seen as the #1 security vulnerability facing web applications. Don't wait another today to learn how protect the organization. The presenter of this webcast gives an overview on XSS (techniques, consequences and vulnerabilities and give real-world examples and offensive techniques aimed at short circuiting...

    Provided By Breach Security

  • Webcasts // Jan 2009

    The Web Hacking Incidents Database (WHID): Trends in Web Application Security

    What are the emerging trends in web application security? The presenter of this webcast will provide an overview of web application security and valuable industry tools. Many organizations today have a difficult time finding reliable data on web attacks and web defects because the number of web attacks reported is...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Report on Application Security for the Federal Industry

    Are the IDS logs providing the security team with overwhelming data? Ever noticed clear attempts at cyber Espionage? Businesses in every industry are affected by web application security - even at the federal level. Rsignia has 20 years of experience in the federal industry and they will share examples of...

    Provided By Breach Security

  • Webcasts // Jan 2009

    WebDefend and the OWASP Top Ten

    With all the web application attacks and vulnerabilities surfacing - it is hard to know where to focus the security efforts. Luckily, OWASP produces the OWASP Top Ten list to raise awareness of web application security. This list is an outstanding starting point for prioritizing web application security attacks and...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Web Application Firewall: A Cost Effective Way to Improve Web Application Security

    With all the options out there today, it's hard to know who to trust. This webcast will help to find cost effective ways to improve the web application security. The presenter of this webcast will throw light on the latest developments in the industry and advice on choosing the right...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Web Hacking Incidents Database (WHID): 2008 Report

    The presenter of this webcast throws light on the challenges of risk analysis for web applications. The presenter also talks about the available vulnerability resources.

    Provided By Breach Security

  • Webcasts // Jan 2009

    Your Guide to PCI Compliance v1.2

    What is the best way to become PCI Compliant and protect web applications? The attendee of this webcast will discover the right solution for the organization and learn the fundamentals of PCI Compliance. The presenter will cover the latest trends in the industry and information regarding the costs of not...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Web Application Integrity Series: SQL Injection

    Concerned with the abundance of emerging web application attacks? This webcast delves into one of the largest web application threats out there, SQL injection, and prepares one with the information needed to keep the company safe. The attendee will gain conceptual overview of SQL injections. The presenter shows how widespread...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Why Security Shouldn't Take a Back Seat to PCI

    The attendee of this webcast will get an overview of PCI DSS and the 6.6 requirements, but more importantly attendee will learn about the risks associated with the storage of sensitive data and the ways in which it can be protected.

    Provided By Breach Security

  • Case Studies // Jan 2009

    Mint Technology Deploys ModSecurity Pro M1100 From Breach Security to Meet PCI Requirement 6.6

    Mint Technology Corporation ("Mint") is a pioneer in prepaid financial products and services and is Canada's first provider of reloadable prepaid credit card programs. As a MasterCard Member Service Provider, Mint works with financial partners to customize prepaid credit card programs that are tailored to an organization's needs. Mint has...

    Provided By Breach Security

  • Case Studies // Jan 2009

    JSC Norvik Banka Secures Web Applications With Breach Security's WebDefend

    JSC Norvik Banka was established in April 1992 to serve both consumer and corporate financial clients with banking services that include cash and settlement, lending and acceptance of deposits, and the renting of safe deposit boxes. The bank is based in Latvia and has more than 100 individual branches while...

    Provided By Breach Security

  • Case Studies // Jan 2009

    Sovereign Bank Protects Web Applications With WebDefend Application Firewall

    Sovereign Bancorp, Inc., the parent company of Sovereign Bank, is an $82 billion financial institution with principal markets in the Northeast United States. Sovereign Bank offers a broad array of financial services and products including retail banking, business and corporate banking, cash management, capital markets, wealth management, and insurance. Being...

    Provided By Breach Security

  • White Papers // Feb 2009

    The Web Hacking Incidents Database 2008

    While financial gain is certainly a big driver for web hacking, ideological hacking cannot be ignored. Government and other organizations especially suffer from ideological hacking. Internet related organizations, especially hosting providers, are suffering from more and more serious for profit hacking incidents. Financial organizations are either starting to be targeted...

    Provided By Breach Security

  • White Papers // Jan 2009

    WAF Virtual Patching Challenge: Securing WebGoat With ModSecurity

    This paper presents the technical details behind a virtual patch, which is a critical protection function provided by Web Application Firewalls (WAFs). A virtual patch is a powerful, agile mitigation strategy to quickly help protect vulnerable web applications from remote compromise. During the course of this whitepaper, it evaluates a...

    Provided By Breach Security

  • White Papers // May 2009

    Detecting Remote File Inclusion Attack

    The biggest challenge standing in front of security experts is to detect attack that cannot easily be detected using signatures; Remote File Inclusion (RFI) is a good example of such as attack. This paper tries to present the challenges of accurately detecting RFI attacks. In order to achieve detection of...

    Provided By Breach Security

  • Webcasts // Jan 2010

    WebDefend and the CWE/SANS Top 25 Most Dangerous Programming Errors 2010

    This webcast is mainly about Web Defend and the CWE/SANS Top 25 of the Most Dangerous Programming Errors that happened in the year 2010.the CWE & SANS is the leader in their domain has been asked by the other companies to construct a list of the list of the top...

    Provided By Breach Security

  • Webcasts // Jan 2010

    Top Web Incidents and Trends of 2009 and Predictions for 2010

    Have your organization come under any sort of attack from the hackers, or attack through any other way in the past. Is your organization worried about the security of your information, and the threat that might appear in the year 2010.Then this is the webcast that would help the attendee...

    Provided By Breach Security