Breach Security

Displaying 1-9 of 9 results

  • Webcasts // Jan 2010

    WebDefend and the CWE/SANS Top 25 Most Dangerous Programming Errors 2010

    This webcast is mainly about Web Defend and the CWE/SANS Top 25 of the Most Dangerous Programming Errors that happened in the year 2010.the CWE & SANS is the leader in their domain has been asked by the other companies to construct a list of the list of the top...

    Provided By Breach Security

  • Webcasts // Jan 2010

    Top Web Incidents and Trends of 2009 and Predictions for 2010

    Have your organization come under any sort of attack from the hackers, or attack through any other way in the past. Is your organization worried about the security of your information, and the threat that might appear in the year 2010.Then this is the webcast that would help the attendee...

    Provided By Breach Security

  • White Papers // Jul 2009

    Scraping, Denial of Service, and Brute Force Attacks! Oh My!: Identifying and Controlling Automated Clients

    Anti-Automation defenses are critical in today's web application security landscape. Breach Security's product line is uniquely positioned to help organizations address these automated types of attacks. Only through the combination of all of these capabilities can organizations gain true protections against these threats. Many systems will allow the use of...

    Provided By Breach Security

  • White Papers // Jun 2009

    The Good, Bad and Necessary: The Complete Guide to PCI 6.6 Success

    It seems that IT administrators and security professionals are always receiving notification of new rules, regulations and compliance codes that fall under their purview. And just when the necessary adjustments have been made, priorities shifted and new technology purchased, the rules are changed - yet again. The Payment Card Industry...

    Provided By Breach Security

  • White Papers // May 2009

    Detecting Remote File Inclusion Attack

    The biggest challenge standing in front of security experts is to detect attack that cannot easily be detected using signatures; Remote File Inclusion (RFI) is a good example of such as attack. This paper tries to present the challenges of accurately detecting RFI attacks. In order to achieve detection of...

    Provided By Breach Security

  • White Papers // Apr 2009

    The Downward Spiral: Failures in Your Web Applications

    Anytime when a web application is not performing as expected, or it's the integrity that is compromised, the outbound flow needs to be analyzed to fully understand what information is being given up. Output is the best indicator of a vulnerability and threat. Applications integrity is the key to its...

    Provided By Breach Security

  • White Papers // Feb 2009

    The Web Hacking Incidents Database 2008: Annual Report

    The Web Hacking Incident Database (WHID) is a project dedicated to maintaining a list of web application-related security incidents. The WHID's purpose is to serve as a tool for raising awareness of web application security problems and provide information for statistical analysis of web application security incidents. Unlike other resources...

    Provided By Breach Security

  • White Papers // Feb 2009

    The Web Hacking Incidents Database 2008

    While financial gain is certainly a big driver for web hacking, ideological hacking cannot be ignored. Government and other organizations especially suffer from ideological hacking. Internet related organizations, especially hosting providers, are suffering from more and more serious for profit hacking incidents. Financial organizations are either starting to be targeted...

    Provided By Breach Security

  • White Papers // Sep 2008

    The Business Case for Web Application Firewalls

    Web application firewalls offer a variety of business benefits such as rapid application deployment, significant cost savings and increased communication between development and security teams. In addition, they also provide security advantages that complement secure coding initiatives, vulnerability scanning efforts and network IDS/IPS. As a result, a web application firewall...

    Provided By Breach Security

  • White Papers // Jul 2009

    Scraping, Denial of Service, and Brute Force Attacks! Oh My!: Identifying and Controlling Automated Clients

    Anti-Automation defenses are critical in today's web application security landscape. Breach Security's product line is uniquely positioned to help organizations address these automated types of attacks. Only through the combination of all of these capabilities can organizations gain true protections against these threats. Many systems will allow the use of...

    Provided By Breach Security

  • White Papers // Jun 2009

    The Good, Bad and Necessary: The Complete Guide to PCI 6.6 Success

    It seems that IT administrators and security professionals are always receiving notification of new rules, regulations and compliance codes that fall under their purview. And just when the necessary adjustments have been made, priorities shifted and new technology purchased, the rules are changed - yet again. The Payment Card Industry...

    Provided By Breach Security

  • White Papers // Apr 2009

    The Downward Spiral: Failures in Your Web Applications

    Anytime when a web application is not performing as expected, or it's the integrity that is compromised, the outbound flow needs to be analyzed to fully understand what information is being given up. Output is the best indicator of a vulnerability and threat. Applications integrity is the key to its...

    Provided By Breach Security

  • White Papers // Feb 2009

    The Web Hacking Incidents Database 2008: Annual Report

    The Web Hacking Incident Database (WHID) is a project dedicated to maintaining a list of web application-related security incidents. The WHID's purpose is to serve as a tool for raising awareness of web application security problems and provide information for statistical analysis of web application security incidents. Unlike other resources...

    Provided By Breach Security

  • White Papers // Sep 2008

    The Business Case for Web Application Firewalls

    Web application firewalls offer a variety of business benefits such as rapid application deployment, significant cost savings and increased communication between development and security teams. In addition, they also provide security advantages that complement secure coding initiatives, vulnerability scanning efforts and network IDS/IPS. As a result, a web application firewall...

    Provided By Breach Security

  • White Papers // Feb 2009

    The Web Hacking Incidents Database 2008

    While financial gain is certainly a big driver for web hacking, ideological hacking cannot be ignored. Government and other organizations especially suffer from ideological hacking. Internet related organizations, especially hosting providers, are suffering from more and more serious for profit hacking incidents. Financial organizations are either starting to be targeted...

    Provided By Breach Security

  • White Papers // May 2009

    Detecting Remote File Inclusion Attack

    The biggest challenge standing in front of security experts is to detect attack that cannot easily be detected using signatures; Remote File Inclusion (RFI) is a good example of such as attack. This paper tries to present the challenges of accurately detecting RFI attacks. In order to achieve detection of...

    Provided By Breach Security

  • Webcasts // Jan 2010

    WebDefend and the CWE/SANS Top 25 Most Dangerous Programming Errors 2010

    This webcast is mainly about Web Defend and the CWE/SANS Top 25 of the Most Dangerous Programming Errors that happened in the year 2010.the CWE & SANS is the leader in their domain has been asked by the other companies to construct a list of the list of the top...

    Provided By Breach Security

  • Webcasts // Jan 2010

    Top Web Incidents and Trends of 2009 and Predictions for 2010

    Have your organization come under any sort of attack from the hackers, or attack through any other way in the past. Is your organization worried about the security of your information, and the threat that might appear in the year 2010.Then this is the webcast that would help the attendee...

    Provided By Breach Security