Closing the Biggest Security Hole in Web Application Delivery

March 1, 2014

Since the beginning of web application delivery, there has been an opportunity for fraudsters to get into the middle of a transaction and impersonate the legitimate user. Since the credentials used for this fraud are valid and “expected to be under the control of the real user,” this type of impersonation has been difficult if not impossible to detect and stop.

Spotlight

Pondurance

Pondurance empowers companies to manage reputational, financial, and regulatory risk through the development and execution of compliance and cyber security solutions. By providing expert consulting and cost-effective managed services, we have helped over 200 companies in North America and Europe reduce their risk exposure and improve their security postures.

OTHER WHITEPAPERS
news image

Four Proven Steps to Integrating Threat Intelligence for Higher-Fidelity Detection and Response

whitePaper | July 20, 2020

Accurate, trustworthy threat intelligence is a boon if you have it – but too much of it becomes a management headache. Analyst group 451 Research, surveying security leaders for its report Tackling the Visibility Gap in Information Security, found that 49% of enterprises using SIEM, EDR, and other security tools were overwhelmed by the day-to-day operation of managing and ingesting threat feeds into their growing technology stack.1

Read More
news image

Low-Code Analysis

whitePaper | December 22, 2022

This study is promoted by Mobile World Capital Barcelona and NTT DATA in the framework of the Barcelona Digital Talent alliance. Mobile World Capital Barcelona is an initiative driving the digital advancement of society while helping improve people’s lives globally.

Read More
news image

API Design Best Practices

whitePaper | August 25, 2022

The document focuses on the best practices to consider for API design by breaking it into its basic building blocks. Along with each recommendation the document also describes the reason and impact of a certain design decision through scenarios. The document provides recommendations on object representations, usage of headers and URL/URI templates to consider.

Read More
news image

Blueprint for an AI Bill of Rights

whitePaper | October 26, 2022

The Blueprint for an AI Bill of Rights: Making Automated Systems Work for the American People was published by the White House Office of Science and Technology Policy in October 2022. This framework was released one year after OSTP announced the launch of a process to develop “a bill of rights for an AI-powered world.” Its release follows a year of public engagement to inform this initiative. The framework is available online at: https://www.whitehouse.gov/ostp/ai-bill-of-rights

Read More
news image

How AI Is Transforming IT Service Desk and Customer Service

whitePaper | June 4, 2021

In this fast-paced and competitive world, the need for speed is vital. This is especially true when it comes to IT and customer service desks. There has been a recent surge of interest in conversational AI platforms that build on all the strengths of AI to help make IT service desks and customer service more efficient.

Read More
news image

AI & Analytics: Trends 2021-2022 and Market Research

whitePaper | July 28, 2022

Before the pandemic, the path to AI adoption used to be slow and steady. According to the survey of industryleading firms, only 48% of companies deemed AI and Big Data a source of innovation. In 2021, this number has climbed to almost 65 percent.

Read More

Spotlight

Pondurance

Pondurance empowers companies to manage reputational, financial, and regulatory risk through the development and execution of compliance and cyber security solutions. By providing expert consulting and cost-effective managed services, we have helped over 200 companies in North America and Europe reduce their risk exposure and improve their security postures.

Events