Join us for our complimentary Webinar. Register Here.
How Web Applications are Attacked: Understanding and Responding to the Five Phases of Web Application Abuse
Wednesday November 3, 2010 11am PST (2pm EST)
Web applications have created a massive attack surface for potential attackers. Because of this, the majority of attacks begin very quietly through a business Web application. This webinar outlines the problem of Web application abuse and how this abuse is used to steal data, money and resources from companies. Understanding the anatomy of an attack is key to selecting the best method of defending against widespread abuse.
Current solutions for securing Web applications rely heavily on signatures to identify and respond to threats. But signatures have become less effective at detecting threats over time, and aren.t sufficient to address the sophisticated abusive behavior that large, publicly exposed Web applications are subject to, including page scraping, logic abuse, malicious automation, phishing, and malware distribution. The key shortcoming is a lack of application context . without any grounding in actual application and user behavior, signature-based solutions can.t avoid flagging many false positives. This makes the information they provide to administrators practically un-actionable.
From this webinar, you will learn:
- How sophisticated attackers successfully abuse Web applications
- The five phases of a Web application attack
- The weaknesses of signature based security
- How companies respond today
- A new innovative approach to Web application defense