IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Cross Site Scripting

RSS Feed    Add to Google    Add to My Yahoo!
Cross Site Scripting Multimedia (View All Report Types)
 
Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

Demo: Full Server Replication Protection
sponsored by Vision Solutions
WEBCAST: Watch this brief webcast for a live demo of a program designed to make your replication process easy, efficient and, most of all, secure.
Posted: 26 Mar 2015 | Premiered: Oct 31, 2013

Vision Solutions

Case Study: Levi Strauss & Co. Gets Comfortable with Simpana Software
sponsored by CommVault
VIRTUAL TRADESHOW: Watch this video to learn what Levi Strauss' VP and CTO Bart Hecht thinks about CommVault.
Posted: 30 Dec 2014 | Premiered: Feb 2, 2012

CommVault

Hospitals Deliver a Secure, Mobile Workspace to Their Staff with VDI
sponsored by Dell, Inc.
VIDEO: Inside this video, discover how they implemented a desktop virtualization solution to deliver secure virtual desktops to their clinicians. Find out how this technology enabled easy, rapid login while securing sessions so they could move around and switch to different workstations seamlessly.
Posted: 20 Mar 2015 | Premiered: 20 Feb 2015

Dell, Inc.

Security at the Speed of DevOps
sponsored by Risk IO
WEBCAST: This exclusive webcast explores the role DevOps can play in helping IT security make the most of their time.
Posted: 23 Jan 2015 | Premiered: Jan 13, 2015

Risk IO

Safeguarding Compliance and Remaining Vigilant
sponsored by IBM
VIDEO: Tune into this brief video to learn how to safeguard enterprise compliance and automate processes to reduce costs and manage risk.
Posted: 26 Feb 2015 | Premiered: 07 Jan 2015

IBM

Beth Israel & CommVault - Customer Testimonial
sponsored by CommVault
VIDEO: Access this video to learn how a storage solution enables a hospital to manage the entire lifecycle of their data and make it secure and accesible needed.
Posted: 10 Nov 2014 | Premiered: 22 Feb 2013

CommVault

Insight into Hacker Economics
sponsored by Juniper Networks, Inc.
WEBCAST: This webcasts takes a closer look at the current and historical trneds in crybercrime methods and tools and how the market is maturing.
Posted: 26 Mar 2015 | Premiered: Mar 27, 2014

Juniper Networks, Inc.

Penn State saves up to USD 300,000 per year by using IBM Endpoint Manager
sponsored by IBM
VIDEO: This exclusive video case study reveals the endpoint management solution Penn State University turned to in order to manage their heterogeneous distributed environments and reduce costs.
Posted: 30 Jan 2015 | Premiered: 30 Jan 2015

IBM

Clearing the Air: Cloud Infrastructure Management Visibility Simplified
sponsored by CA Technologies.
WEBCAST: In this white paper, explore how IIJ Global Singapore, a subsidiary of the leading internet access and network solutions provider, leveraged a unified monitoring platform to give customers a single-pane-of-glass view. Read on to learn how this platform can increase visibility in your organization.
Posted: 29 Dec 2014 | Premiered: Oct 9, 2014

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement