Web Application Security

Last Updated on 9 April 2014, Total: 16 Articles and Tutorials

How to secure web applications

  1. Web Browser Security Revisited (Part 6)

    In this article we'll look at some tips on how to best secure Mozilla Firefox... Read More

  2. Web Browser Security Revisited (Part 5)

    In this article we’ll look at the special features Google provides for enterprise administrators with its Chrome for Business... Read More

  3. Web Browser Security Revisited (Part 4)

    In this article we'll discuss how to adjust Google Chrome’s security and privacy settings for best security practices... Read More

  4. Web Browser Security Revisited (Part 3)

    In Part 1 of this series, we discussed the importance of web browser security and some security-related issues that are common to all or many of the popular browsers today. In Part 2, we talked about some specific security mechanisms that are built into Internet Explorer and how they’re implemented. This time, we’ll look at how to configure IE for... Read More

  5. Web Browser Security Revisited (Part 2)

    In this article we'll look at Microsoft’s browser, Internet Explorer... Read More

  6. Web Browser Security Revisited (Part 1)

    In this article, we'll take a look at the state of web browser security now, how it's changed over the years, some security-related factors to consider when selecting a browser, and how to configure whichever browser you choose for your own browsing and for your users, to make it as secure as possible... Read More

  7. SEO Poisoning: What it is and what you can do about it

    How to protect your organization from SEO Poisoning without crippling users’ ability to conduct internet searches... Read More

  8. Sharepoint Data Security Risks

    The challenges of securing data on Microsoft SharePoint sites, lists, pages and the information made available through data-links to backend systems (through BDC and manually created data-links)... Read More

  9. Microsoft Live Mesh: What are the Security Implications?

    The security implications of cloud computing in general and Live Mesh in particular, and what mechanisms Microsoft has built in to protect your "meshed" devices and data... Read More

  10. Web Application Hacking vs the IDS

    The world of web application hacking is an enormous one, and also one that is constantly changing. Just how well does your IDS fare against it?... Read More

Featured Links