5,025 Results for:Web application and API security best practices

  • Filter by: 

Secure Web Gateway Overview: Implementation Best Practices

sponsored by SearchSecurity.com Published: 10 May 2013 eGuide

This E-Guide from SearchSecurity.com unveils a number of best practices for implementing a web security gateway to help you get the most out of your investment. View now to learn more!

View Now

Mobile API Management Best Practices

sponsored by SearchSecurity.com Published: 25 Oct 2013 eGuide

This expert guide from SearchSOA.com discusses crucial best practices for mobile API management, examining the latest technologies and providing feedback from companies who have recently implemented mobile API ...

View Now

E-Guide: Best practices for pen testing Web applications

sponsored by SearchSecurity.com Published: 24 Oct 2011 eGuide

This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid ...

View Now

Mobile Application Security Best Practices to Protect Corporate Data

sponsored by SearchSecurity.com Published: 11 Jul 2013 eGuide

This expert guide from SearchConsumerization.com explains the risks associated with mobile devices and discusses native security measures built into mobile operating systems and best practices for mitigating common...

View Now

Best practices for web application hosting

sponsored by Alibaba Cloud Published: 15 Jan 2018 White Paper

This white paper compares traditional and modern modes of web hosting using cloud services and describes how cloud computing has the edge. Gain a practical reference to real-time business use cases, their impact, ...

View Now

AWS Security Best Practices

sponsored by Amazon Web Services Published: 31 Aug 2016 White Paper

Is your data protected from accidental or deliberate theft, leakage, integrity compromise, and deletion? In this white paper, explore best practices that you can leverage to build and define an Information Security...

View Now

Applications and best practices to keep your mobile devices secure

sponsored by SearchSecurity.com Published: 06 Mar 2012 eGuide

Uncover best practices for keeping your mobile devices and applications secure.

View Now

Taking Action to Secure Web Applications

sponsored by SearchSecurity.com Published: 03 May 2013 eGuide

This expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.

View Now

Beating web application security threats

sponsored by SearchSecurity.com Published: 31 Oct 2011 eGuide

Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that ...

View Now

A Strategic Approach to Web Application Security

sponsored by WhiteHat Security Published: 31 Dec 2017 White Paper

App vulnerabilities originate with the source code, and you'll want to secure more of your source code in both development and production. But it's easier said than done for security pros to review source code ...

View Now