APPLICATION SECURITY

Applications are the engine of the modern enterprise and contain the most critical data, so keeping applications safe from hackers is the number one concern of IT security teams. We cover everything from application security measures and patches to protecting critical servers and databases to keep your most valuable customer and application data safe.

LATEST APPLICATION SECURITY ARTICLES

Trusona Raises $10M to Kill Passwords

|

The startup raises attracts millions of dollars from Microsoft Ventures and Kleiner Perkins.

READ MORE

IBM Cloud Identity Connect Brings IDaaS to Hybrid Cloud Shops

|

IBM Cloud Identity Connect brings secure single sign-on capabilities to businesses looking to manage user access on-premises and in the cloud.

READ MORE

WordPress 4.7.5 Fixes Six Security Vulnerabilities

|

Widely deployed open-source content management system patched for a half-dozen different issues as new bug bounty program is set to debut.

READ MORE

Data Loss Prevention (DLP): Keeping Sensitive Data Safe from Leaks

|

The cost of a data leak is getting so high that Data Loss Prevention technology is looking like a bargain. Here's everything you need to know about DLP technology and products.

READ MORE

Identity and Access Management: Balancing Access and Security

|

In an era where hackers seem to have the upper hand, organizations can take greater control of networks and data with Identity and Access Management (IAM). We outline IAM security technology and solutions and discuss how to utilize it to protect your business.

READ MORE

TOP APPLICATION SECURITY RESOURCES

IDENTITY AND ACCESS MANAGEMENT

We outline IAM security technology and solutions and discuss how to utilize it to protect your business.

READ MORE

APPLICATION FIREWALLS

Application firewalls are a critical security layer between web traffic and your application server.

READ MORE

MULTI-FACTOR AUTHENTICATION

A comprehensive look at MFA security, two-factor authentication, mobile authentication, biometrics, and vendors, and what to learn before adopting an MFA solution.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|

TLS/SSL: Be Wary of What Travels Inside

Encrypted web communication routinely bypasses enterprise security controls. Left unscanned, these channels are perfect vehicles for hiding infection, command & control, and data..

TLS/SSL: Where Are We Today?

Encryption keeps data confidential, but we're left unprotected from threats that may be embedded in the data. In fact, encryption actually conceals these threats and adds network...

Breach Detection Systems: Product Selection Guide

Breach detection systems (BDS) are security products that offer timely detection of threats. When evaluating these products, customers must take into account traditional factors, such...

Advanced Endpoint Protection: When Should an Enterprise Move to AEP?

Advanced endpoint protection (AEP) products are still relatively immature, which makes it difficult to decide whether to replace or augment existing endpoint protection (EPP). Adding...

Advanced Endpoint Protection: Strategic Guidance

Replacing traditional antivirus (AV) with advanced endpoint protection (AEP) products may not be the best decision for every organization. If you do decide to switch, determining...
 
SEE ALL WHITEPAPERS
 
Application Firewalls: Protecting Web Applications from Attacks

Application Firewalls: Protecting Web Applications from Attacks

|

Application firewalls are a critical security layer between web traffic and your application server. Learn how WAF technology stops attacks and who the top vendors are.

READ MORE
Patch Management: How to Update Software on Your Network Securely

Patch Management: How to Update Software on Your Network Securely

|

Efficient patch management is vital to ensure the security and smooth function of corporate software, and patch management solutions are the easiest way to get there. Find out everything you need to know to implement an effective patch management software system.

READ MORE
Multi-Factor Authentication: A Critical Security Tool for Enterprises

Multi-Factor Authentication: A Critical Security Tool for Enterprises

|

Multi-factor authentication provides a more secure option than passwords and ID alone. We take a comprehensive look at MFA security, two-factor authentication, mobile authentication, biometrics and vendors, and issues to consider before adopting an MFA solution.

READ MORE