Web Application Security

Last Updated on 16 Nov. 2016, Total: 19 Articles and Tutorials

How to secure web applications

  1. The Ultimate Guide to Addressing Web Security Vulnerabilities

    This article looks at addressing web security vulnerabilities... Read More

  2. Security challenges presented by microservices

    This article takes a look at the security challenges presented by Microservices... Read More

  3. Web Browser Security Revisited (Part 7)

    For the past 6 articles, we’ve been talking about the current state of web browser security, both in general and as it applies to different popular browsers. We’ve covered specifics for the “Big Three,” Internet Explorer, Chrome and Firefox. In this, Part 7, we’re going to wrap it up with the other two browsers that have statistically significant market shares:... Read More

  4. Web Browser Security Revisited (Part 6)

    In this article we'll look at some tips on how to best secure Mozilla Firefox... Read More

  5. Web Browser Security Revisited (Part 5)

    In this article we’ll look at the special features Google provides for enterprise administrators with its Chrome for Business... Read More

  6. Web Browser Security Revisited (Part 4)

    In this article we'll discuss how to adjust Google Chrome’s security and privacy settings for best security practices... Read More

  7. Web Browser Security Revisited (Part 3)

    In Part 1 of this series, we discussed the importance of web browser security and some security-related issues that are common to all or many of the popular browsers today. In Part 2, we talked about some specific security mechanisms that are built into Internet Explorer and how they’re implemented. This time, we’ll look at how to configure IE for... Read More

  8. Web Browser Security Revisited (Part 2)

    In this article we'll look at Microsoft’s browser, Internet Explorer... Read More

  9. Web Browser Security Revisited (Part 1)

    In this article, we'll take a look at the state of web browser security now, how it's changed over the years, some security-related factors to consider when selecting a browser, and how to configure whichever browser you choose for your own browsing and for your users, to make it as secure as possible... Read More

  10. SEO Poisoning: What it is and what you can do about it

    How to protect your organization from SEO Poisoning without crippling users’ ability to conduct internet searches... Read More