IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Cross Site Scripting

RSS Feed    Add to Google    Add to My Yahoo!
Cross Site ScriptingMultimedia (View All Report Types)
 
Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

HP and United: Teaming together for a successful migration
sponsored by Hewlett-Packard Limited
WEBCAST: In this brief video case study, learn how United Airlines achieved a quick IT migration of a large size and scale – all without impact from a technology perspective.
Posted: 07 Feb 2014 | Premiered: Dec 31, 2012

Hewlett-Packard Limited

Hidden Lynx – Professional Hackers for Hire
sponsored by Symantec Corporation
WEBCAST: This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Symantec Corporation

UK MSP: Winning and Retaining Customers More Effectively with Autotask
sponsored by Autotask Corporation
VIDEO: This brief video covers how to make your organization accountable for IT.
Posted: 29 Jan 2014 | Premiered: 29 Jan 2014

Autotask Corporation

Comprehensive Cloud Security Requires an Automated Approach
sponsored by CloudPassage
WEBCAST: This webcast highlights major cloud security challenges and offers best practices to alleviate each issue. Click through to learn how automation may be your key to security success.
Posted: 31 Mar 2014 | Premiered: Nov 12, 2013

CloudPassage

Operations Analytics: IT's new year's resolution to innovate IT Operations
sponsored by Hewlett-Packard Company
WEBCAST: Did you know that 55% of data IT collects remains unused? That's over half of IT's data not being used to detect issues earlier, improve processes, and predict problems. View this webcast to discover how to get comprehensive, actionable insight into all IT operations by harnessing the power of big data and analytics.
Posted: 05 Feb 2014 | Premiered: Feb 5, 2014

Hewlett-Packard Company

Security and Compliance Best Practices for SaaS Providers
sponsored by CloudPassage
WEBCAST: This webcast reviews the latest trends in software architectures and delivery models, along with the issues software-as-a-service (SaaS) providers must take into consideration when developing security measures.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

CloudPassage

Accelerate the Deployment of Regulated Workloads in Virtualized or Cloud Infrastructures
sponsored by VMware, Inc.
WEBCAST: Watch this informative webcast to find out how VMware can help revolutionize your virtual or cloud-based infrastructure.
Posted: 28 Feb 2014 | Premiered: Feb 28, 2014

VMware, Inc.

Automated Management and Monitoring for your IT System
sponsored by CentraStage
WEBCAST: This brief video explores the benefits of automated IT monitoring and management and how your business can best utilize this tool.
Posted: 11 Mar 2014 | Premiered: Jan 14, 2014

CentraStage

Butler County’s Iron Mountain Houses Some of U.S.’s Most Amazing, Priceless Treasures
sponsored by Iron Mountain
WEBCAST: This news story describes why Iron Mountain's Butler County, Pennsylvania data center facility is ideal for storing and preserving your business-critical data. Learn why this facility is trusted to securely store everything from the original prints of classic movies to a huge variety of documents and records.
Posted: 29 Jan 2014 | Premiered: Nov 19, 2013

Iron Mountain
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement