Breach Security

Displaying 1-6 of 6 results

  • Webcasts // Jan 2010

    WebDefend and the CWE/SANS Top 25 Most Dangerous Programming Errors 2010

    This webcast is mainly about Web Defend and the CWE/SANS Top 25 of the Most Dangerous Programming Errors that happened in the year 2010.the CWE & SANS is the leader in their domain has been asked by the other companies to construct a list of the list of the top...

    Provided By Breach Security

  • Webcasts // Jan 2010

    Top Web Incidents and Trends of 2009 and Predictions for 2010

    Have your organization come under any sort of attack from the hackers, or attack through any other way in the past. Is your organization worried about the security of your information, and the threat that might appear in the year 2010.Then this is the webcast that would help the attendee...

    Provided By Breach Security

  • White Papers // Jul 2009

    Scraping, Denial of Service, and Brute Force Attacks! Oh My!: Identifying and Controlling Automated Clients

    Anti-Automation defenses are critical in today's web application security landscape. Breach Security's product line is uniquely positioned to help organizations address these automated types of attacks. Only through the combination of all of these capabilities can organizations gain true protections against these threats. Many systems will allow the use of...

    Provided By Breach Security

  • White Papers // Jun 2009

    The Good, Bad and Necessary: The Complete Guide to PCI 6.6 Success

    It seems that IT administrators and security professionals are always receiving notification of new rules, regulations and compliance codes that fall under their purview. And just when the necessary adjustments have been made, priorities shifted and new technology purchased, the rules are changed - yet again. The Payment Card Industry...

    Provided By Breach Security

  • White Papers // May 2009

    Detecting Remote File Inclusion Attack

    The biggest challenge standing in front of security experts is to detect attack that cannot easily be detected using signatures; Remote File Inclusion (RFI) is a good example of such as attack. This paper tries to present the challenges of accurately detecting RFI attacks. In order to achieve detection of...

    Provided By Breach Security

  • White Papers // Sep 2008

    The Business Case for Web Application Firewalls

    Web application firewalls offer a variety of business benefits such as rapid application deployment, significant cost savings and increased communication between development and security teams. In addition, they also provide security advantages that complement secure coding initiatives, vulnerability scanning efforts and network IDS/IPS. As a result, a web application firewall...

    Provided By Breach Security

  • White Papers // May 2009

    Detecting Remote File Inclusion Attack

    The biggest challenge standing in front of security experts is to detect attack that cannot easily be detected using signatures; Remote File Inclusion (RFI) is a good example of such as attack. This paper tries to present the challenges of accurately detecting RFI attacks. In order to achieve detection of...

    Provided By Breach Security

  • White Papers // Jul 2009

    Scraping, Denial of Service, and Brute Force Attacks! Oh My!: Identifying and Controlling Automated Clients

    Anti-Automation defenses are critical in today's web application security landscape. Breach Security's product line is uniquely positioned to help organizations address these automated types of attacks. Only through the combination of all of these capabilities can organizations gain true protections against these threats. Many systems will allow the use of...

    Provided By Breach Security

  • White Papers // Jun 2009

    The Good, Bad and Necessary: The Complete Guide to PCI 6.6 Success

    It seems that IT administrators and security professionals are always receiving notification of new rules, regulations and compliance codes that fall under their purview. And just when the necessary adjustments have been made, priorities shifted and new technology purchased, the rules are changed - yet again. The Payment Card Industry...

    Provided By Breach Security

  • White Papers // Sep 2008

    The Business Case for Web Application Firewalls

    Web application firewalls offer a variety of business benefits such as rapid application deployment, significant cost savings and increased communication between development and security teams. In addition, they also provide security advantages that complement secure coding initiatives, vulnerability scanning efforts and network IDS/IPS. As a result, a web application firewall...

    Provided By Breach Security

  • Webcasts // Jan 2010

    WebDefend and the CWE/SANS Top 25 Most Dangerous Programming Errors 2010

    This webcast is mainly about Web Defend and the CWE/SANS Top 25 of the Most Dangerous Programming Errors that happened in the year 2010.the CWE & SANS is the leader in their domain has been asked by the other companies to construct a list of the list of the top...

    Provided By Breach Security

  • Webcasts // Jan 2010

    Top Web Incidents and Trends of 2009 and Predictions for 2010

    Have your organization come under any sort of attack from the hackers, or attack through any other way in the past. Is your organization worried about the security of your information, and the threat that might appear in the year 2010.Then this is the webcast that would help the attendee...

    Provided By Breach Security