Finding New Approaches to Web Application Security

Because so much is centered on web services and similar technology nowadays, web application security must be a high priority within any security system.

The post Finding New Approaches to Web Application Security appeared first on Security Intelligence.

Continue reading Finding New Approaches to Web Application Security

The Changing Landscape of Automated Attacks on Web and Mobile Apps

In recent years, we have witnessed an unprecedented surge in automated attacks targeting online businesses. These attacks are aimed at validating stolen payment card details, scraping content, taking over accounts and sometimes even slowing down the t… Continue reading The Changing Landscape of Automated Attacks on Web and Mobile Apps

After its acquisition, Magento starts integrating Adobe’s personalization and analytics tools

It’s been less than six months since Adobe acquired commerce platform Magento for $1.68 billion and today, at Magento’s annual conference, the company announced the first set of integrations that bring the analytics and personalization features of Adobe’s Experience Cloud to Magento’s Commerce Cloud. In many ways, the acquisition of Magento helps Adobe close the […] Continue reading After its acquisition, Magento starts integrating Adobe’s personalization and analytics tools

Definition of Cloud Identity and Access Management (IAM)

Identity and access management (IAM) is a cornerstone of IT and has been for decades. Yet, with the majority of traditional on-prem IT infrastructure migrating to the cloud via vendors such as AWS® and GCP™ and applications shifting to the w… Continue reading Definition of Cloud Identity and Access Management (IAM)

Vulnerable Web Applications Leave All Sectors at Risk

Coming into 2018, security professionals expected to see a continued increase in the use of websites as a means of infecting user workstations, according to a recently released report from Positive Technologies. The prediction has proven true. Website… Continue reading Vulnerable Web Applications Leave All Sectors at Risk

An Introduction to HTTP Response Headers for Security

HTTP response headers aim to help protect web applications from cross-site scripting (XSS), man-in-the-middle (MitM) attacks, clickjacking, cross-site request forgery and other threat vectors.

The post An Introduction to HTTP Response Headers for Security appeared first on Security Intelligence.

Continue reading An Introduction to HTTP Response Headers for Security

Managed Identity and Access Management (IAM)

Managed identity and access management solutions are making a major impact for IT organizations. Identity management is a major part of any IT organizations management tool infrastructure, and a new…
The post Managed Identity and Access Management (I… Continue reading Managed Identity and Access Management (IAM)

Identifying Weak Session Tokens Using Entropy – Tradecraft Security Weekly #15

Session management in web applications is extremely important in regards to securing user credentials and integrity within the application. Sometimes, session tokens can be predicted, provided the overall randomness is weak. If this is possible, a remote attacker may be able to compromise the session of an authenticated user. In this episode of Tradecraft Security […]

The post Identifying Weak Session Tokens Using Entropy – Tradecraft Security Weekly #15 appeared first on Security Weekly.

Continue reading Identifying Weak Session Tokens Using Entropy – Tradecraft Security Weekly #15