Breach Security

Displaying 1-24 of 24 results

  • Webcasts // Jan 2010

    WebDefend and the CWE/SANS Top 25 Most Dangerous Programming Errors 2010

    This webcast is mainly about Web Defend and the CWE/SANS Top 25 of the Most Dangerous Programming Errors that happened in the year 2010.the CWE & SANS is the leader in their domain has been asked by the other companies to construct a list of the list of the top...

    Provided By Breach Security

  • Webcasts // Jan 2010

    Top Web Incidents and Trends of 2009 and Predictions for 2010

    Have your organization come under any sort of attack from the hackers, or attack through any other way in the past. Is your organization worried about the security of your information, and the threat that might appear in the year 2010.Then this is the webcast that would help the attendee...

    Provided By Breach Security

  • White Papers // Jul 2009

    Scraping, Denial of Service, and Brute Force Attacks! Oh My!: Identifying and Controlling Automated Clients

    Anti-Automation defenses are critical in today's web application security landscape. Breach Security's product line is uniquely positioned to help organizations address these automated types of attacks. Only through the combination of all of these capabilities can organizations gain true protections against these threats. Many systems will allow the use of...

    Provided By Breach Security

  • White Papers // Jun 2009

    The Good, Bad and Necessary: The Complete Guide to PCI 6.6 Success

    It seems that IT administrators and security professionals are always receiving notification of new rules, regulations and compliance codes that fall under their purview. And just when the necessary adjustments have been made, priorities shifted and new technology purchased, the rules are changed - yet again. The Payment Card Industry...

    Provided By Breach Security

  • White Papers // May 2009

    Detecting Remote File Inclusion Attack

    The biggest challenge standing in front of security experts is to detect attack that cannot easily be detected using signatures; Remote File Inclusion (RFI) is a good example of such as attack. This paper tries to present the challenges of accurately detecting RFI attacks. In order to achieve detection of...

    Provided By Breach Security

  • White Papers // Apr 2009

    The Downward Spiral: Failures in Your Web Applications

    Anytime when a web application is not performing as expected, or it's the integrity that is compromised, the outbound flow needs to be analyzed to fully understand what information is being given up. Output is the best indicator of a vulnerability and threat. Applications integrity is the key to its...

    Provided By Breach Security

  • White Papers // Feb 2009

    The Web Hacking Incidents Database 2008: Annual Report

    The Web Hacking Incident Database (WHID) is a project dedicated to maintaining a list of web application-related security incidents. The WHID's purpose is to serve as a tool for raising awareness of web application security problems and provide information for statistical analysis of web application security incidents. Unlike other resources...

    Provided By Breach Security

  • White Papers // Feb 2009

    The Web Hacking Incidents Database 2008

    While financial gain is certainly a big driver for web hacking, ideological hacking cannot be ignored. Government and other organizations especially suffer from ideological hacking. Internet related organizations, especially hosting providers, are suffering from more and more serious for profit hacking incidents. Financial organizations are either starting to be targeted...

    Provided By Breach Security

  • White Papers // Jan 2009

    WAF Virtual Patching Challenge: Securing WebGoat With ModSecurity

    This paper presents the technical details behind a virtual patch, which is a critical protection function provided by Web Application Firewalls (WAFs). A virtual patch is a powerful, agile mitigation strategy to quickly help protect vulnerable web applications from remote compromise. During the course of this whitepaper, it evaluates a...

    Provided By Breach Security

  • White Papers // Jan 2009

    WebDefend and the CWE/SANS Top 25 Most Dangerous Programming Errors

    The WebDefend web application firewall is an advanced web application security solution that offers customized, behavior-based security for every protected application. WebDefend uses a patent-pending profiling system and multiple, collaborative detection engines to provide complete protection for applications, keep the organization's confidential information safe and ensure the flow of mission-critical...

    Provided By Breach Security

  • Webcasts // Jan 2009

    The Web Hacking Incidents Database 2009: Bi-Annual Report

    The much anticipated Web Hacking Incidents Database (WHID) 2009 Bi-Annual Report is ready for download. The WHID project is dedicated to maintaining a record of web application-related security incidents. The WHID's purpose is to serve as a tool for raising awareness of web application security problems and provide information for...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Outsmarting Tomorrow's Hackers Today

    Network IDS/IPS and first-generation Web Application Firewalls (WAFs) don't protect against today's sophisticated web application threats, such as cross-site scripting, injection flaws and other vulnerabilities listed on the OWASP Top 10. IT professionals need the necessary visibility into their web application security to understand how applications are being used, when...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Anti-Automation: Identifying and Controlling Automated Clients

    Brute force. Denial of service. Bot attacks. Are automated programs attacking the web applications? An overwhelming number of companies can't identify when automated attackers are threatening their system. This webcast outlines what insufficient anti-automation can mean to the company.

    Provided By Breach Security

  • Webcasts // Jan 2009

    The Perils of Cross-Site Scripting (XSS)

    Cross-site Scripting (XSS) attacks are universally seen as the #1 security vulnerability facing web applications. Don't wait another today to learn how protect the organization. The presenter of this webcast gives an overview on XSS (techniques, consequences and vulnerabilities and give real-world examples and offensive techniques aimed at short circuiting...

    Provided By Breach Security

  • Webcasts // Jan 2009

    The Web Hacking Incidents Database (WHID): Trends in Web Application Security

    What are the emerging trends in web application security? The presenter of this webcast will provide an overview of web application security and valuable industry tools. Many organizations today have a difficult time finding reliable data on web attacks and web defects because the number of web attacks reported is...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Report on Application Security for the Federal Industry

    Are the IDS logs providing the security team with overwhelming data? Ever noticed clear attempts at cyber Espionage? Businesses in every industry are affected by web application security - even at the federal level. Rsignia has 20 years of experience in the federal industry and they will share examples of...

    Provided By Breach Security

  • Webcasts // Jan 2009

    WebDefend and the OWASP Top Ten

    With all the web application attacks and vulnerabilities surfacing - it is hard to know where to focus the security efforts. Luckily, OWASP produces the OWASP Top Ten list to raise awareness of web application security. This list is an outstanding starting point for prioritizing web application security attacks and...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Web Application Firewall: A Cost Effective Way to Improve Web Application Security

    With all the options out there today, it's hard to know who to trust. This webcast will help to find cost effective ways to improve the web application security. The presenter of this webcast will throw light on the latest developments in the industry and advice on choosing the right...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Web Hacking Incidents Database (WHID): 2008 Report

    The presenter of this webcast throws light on the challenges of risk analysis for web applications. The presenter also talks about the available vulnerability resources.

    Provided By Breach Security

  • Webcasts // Jan 2009

    Your Guide to PCI Compliance v1.2

    What is the best way to become PCI Compliant and protect web applications? The attendee of this webcast will discover the right solution for the organization and learn the fundamentals of PCI Compliance. The presenter will cover the latest trends in the industry and information regarding the costs of not...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Web Application Integrity Series: SQL Injection

    Concerned with the abundance of emerging web application attacks? This webcast delves into one of the largest web application threats out there, SQL injection, and prepares one with the information needed to keep the company safe. The attendee will gain conceptual overview of SQL injections. The presenter shows how widespread...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Why Security Shouldn't Take a Back Seat to PCI

    The attendee of this webcast will get an overview of PCI DSS and the 6.6 requirements, but more importantly attendee will learn about the risks associated with the storage of sensitive data and the ways in which it can be protected.

    Provided By Breach Security

  • White Papers // Oct 2008

    Guide to PCI Compliance for Web Applications: Updated for Version 1.2 of the Payment Card Industry Data Security Standard

    On the surface, the Payment Card Industry (PCI) Data Security Standard (DSS) reads as a series of do this, don't do that" absolutes. Vet, in three areas, the standard gives organizations some flexibility in their options. The most critical of these choices lies in Requirement 8.6. This section states that...

    Provided By Breach Security

  • White Papers // Sep 2008

    The Business Case for Web Application Firewalls

    Web application firewalls offer a variety of business benefits such as rapid application deployment, significant cost savings and increased communication between development and security teams. In addition, they also provide security advantages that complement secure coding initiatives, vulnerability scanning efforts and network IDS/IPS. As a result, a web application firewall...

    Provided By Breach Security

  • White Papers // Jul 2009

    Scraping, Denial of Service, and Brute Force Attacks! Oh My!: Identifying and Controlling Automated Clients

    Anti-Automation defenses are critical in today's web application security landscape. Breach Security's product line is uniquely positioned to help organizations address these automated types of attacks. Only through the combination of all of these capabilities can organizations gain true protections against these threats. Many systems will allow the use of...

    Provided By Breach Security

  • White Papers // Jun 2009

    The Good, Bad and Necessary: The Complete Guide to PCI 6.6 Success

    It seems that IT administrators and security professionals are always receiving notification of new rules, regulations and compliance codes that fall under their purview. And just when the necessary adjustments have been made, priorities shifted and new technology purchased, the rules are changed - yet again. The Payment Card Industry...

    Provided By Breach Security

  • White Papers // Apr 2009

    The Downward Spiral: Failures in Your Web Applications

    Anytime when a web application is not performing as expected, or it's the integrity that is compromised, the outbound flow needs to be analyzed to fully understand what information is being given up. Output is the best indicator of a vulnerability and threat. Applications integrity is the key to its...

    Provided By Breach Security

  • White Papers // Feb 2009

    The Web Hacking Incidents Database 2008: Annual Report

    The Web Hacking Incident Database (WHID) is a project dedicated to maintaining a list of web application-related security incidents. The WHID's purpose is to serve as a tool for raising awareness of web application security problems and provide information for statistical analysis of web application security incidents. Unlike other resources...

    Provided By Breach Security

  • White Papers // Jan 2009

    WebDefend and the CWE/SANS Top 25 Most Dangerous Programming Errors

    The WebDefend web application firewall is an advanced web application security solution that offers customized, behavior-based security for every protected application. WebDefend uses a patent-pending profiling system and multiple, collaborative detection engines to provide complete protection for applications, keep the organization's confidential information safe and ensure the flow of mission-critical...

    Provided By Breach Security

  • White Papers // Sep 2008

    The Business Case for Web Application Firewalls

    Web application firewalls offer a variety of business benefits such as rapid application deployment, significant cost savings and increased communication between development and security teams. In addition, they also provide security advantages that complement secure coding initiatives, vulnerability scanning efforts and network IDS/IPS. As a result, a web application firewall...

    Provided By Breach Security

  • White Papers // Oct 2008

    Guide to PCI Compliance for Web Applications: Updated for Version 1.2 of the Payment Card Industry Data Security Standard

    On the surface, the Payment Card Industry (PCI) Data Security Standard (DSS) reads as a series of do this, don't do that" absolutes. Vet, in three areas, the standard gives organizations some flexibility in their options. The most critical of these choices lies in Requirement 8.6. This section states that...

    Provided By Breach Security

  • Webcasts // Jan 2009

    The Web Hacking Incidents Database 2009: Bi-Annual Report

    The much anticipated Web Hacking Incidents Database (WHID) 2009 Bi-Annual Report is ready for download. The WHID project is dedicated to maintaining a record of web application-related security incidents. The WHID's purpose is to serve as a tool for raising awareness of web application security problems and provide information for...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Outsmarting Tomorrow's Hackers Today

    Network IDS/IPS and first-generation Web Application Firewalls (WAFs) don't protect against today's sophisticated web application threats, such as cross-site scripting, injection flaws and other vulnerabilities listed on the OWASP Top 10. IT professionals need the necessary visibility into their web application security to understand how applications are being used, when...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Anti-Automation: Identifying and Controlling Automated Clients

    Brute force. Denial of service. Bot attacks. Are automated programs attacking the web applications? An overwhelming number of companies can't identify when automated attackers are threatening their system. This webcast outlines what insufficient anti-automation can mean to the company.

    Provided By Breach Security

  • Webcasts // Jan 2009

    The Perils of Cross-Site Scripting (XSS)

    Cross-site Scripting (XSS) attacks are universally seen as the #1 security vulnerability facing web applications. Don't wait another today to learn how protect the organization. The presenter of this webcast gives an overview on XSS (techniques, consequences and vulnerabilities and give real-world examples and offensive techniques aimed at short circuiting...

    Provided By Breach Security

  • Webcasts // Jan 2009

    The Web Hacking Incidents Database (WHID): Trends in Web Application Security

    What are the emerging trends in web application security? The presenter of this webcast will provide an overview of web application security and valuable industry tools. Many organizations today have a difficult time finding reliable data on web attacks and web defects because the number of web attacks reported is...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Report on Application Security for the Federal Industry

    Are the IDS logs providing the security team with overwhelming data? Ever noticed clear attempts at cyber Espionage? Businesses in every industry are affected by web application security - even at the federal level. Rsignia has 20 years of experience in the federal industry and they will share examples of...

    Provided By Breach Security

  • Webcasts // Jan 2009

    WebDefend and the OWASP Top Ten

    With all the web application attacks and vulnerabilities surfacing - it is hard to know where to focus the security efforts. Luckily, OWASP produces the OWASP Top Ten list to raise awareness of web application security. This list is an outstanding starting point for prioritizing web application security attacks and...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Web Application Firewall: A Cost Effective Way to Improve Web Application Security

    With all the options out there today, it's hard to know who to trust. This webcast will help to find cost effective ways to improve the web application security. The presenter of this webcast will throw light on the latest developments in the industry and advice on choosing the right...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Web Hacking Incidents Database (WHID): 2008 Report

    The presenter of this webcast throws light on the challenges of risk analysis for web applications. The presenter also talks about the available vulnerability resources.

    Provided By Breach Security

  • Webcasts // Jan 2009

    Your Guide to PCI Compliance v1.2

    What is the best way to become PCI Compliant and protect web applications? The attendee of this webcast will discover the right solution for the organization and learn the fundamentals of PCI Compliance. The presenter will cover the latest trends in the industry and information regarding the costs of not...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Web Application Integrity Series: SQL Injection

    Concerned with the abundance of emerging web application attacks? This webcast delves into one of the largest web application threats out there, SQL injection, and prepares one with the information needed to keep the company safe. The attendee will gain conceptual overview of SQL injections. The presenter shows how widespread...

    Provided By Breach Security

  • Webcasts // Jan 2009

    Why Security Shouldn't Take a Back Seat to PCI

    The attendee of this webcast will get an overview of PCI DSS and the 6.6 requirements, but more importantly attendee will learn about the risks associated with the storage of sensitive data and the ways in which it can be protected.

    Provided By Breach Security

  • White Papers // Feb 2009

    The Web Hacking Incidents Database 2008

    While financial gain is certainly a big driver for web hacking, ideological hacking cannot be ignored. Government and other organizations especially suffer from ideological hacking. Internet related organizations, especially hosting providers, are suffering from more and more serious for profit hacking incidents. Financial organizations are either starting to be targeted...

    Provided By Breach Security

  • White Papers // Jan 2009

    WAF Virtual Patching Challenge: Securing WebGoat With ModSecurity

    This paper presents the technical details behind a virtual patch, which is a critical protection function provided by Web Application Firewalls (WAFs). A virtual patch is a powerful, agile mitigation strategy to quickly help protect vulnerable web applications from remote compromise. During the course of this whitepaper, it evaluates a...

    Provided By Breach Security

  • White Papers // May 2009

    Detecting Remote File Inclusion Attack

    The biggest challenge standing in front of security experts is to detect attack that cannot easily be detected using signatures; Remote File Inclusion (RFI) is a good example of such as attack. This paper tries to present the challenges of accurately detecting RFI attacks. In order to achieve detection of...

    Provided By Breach Security

  • Webcasts // Jan 2010

    WebDefend and the CWE/SANS Top 25 Most Dangerous Programming Errors 2010

    This webcast is mainly about Web Defend and the CWE/SANS Top 25 of the Most Dangerous Programming Errors that happened in the year 2010.the CWE & SANS is the leader in their domain has been asked by the other companies to construct a list of the list of the top...

    Provided By Breach Security

  • Webcasts // Jan 2010

    Top Web Incidents and Trends of 2009 and Predictions for 2010

    Have your organization come under any sort of attack from the hackers, or attack through any other way in the past. Is your organization worried about the security of your information, and the threat that might appear in the year 2010.Then this is the webcast that would help the attendee...

    Provided By Breach Security