IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Cross Site Scripting

RSS Feed    Add to Google    Add to My Yahoo!
Cross Site Scripting Multimedia (View All Report Types)
 
Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

Your Pathway to the Composable Infrastructure
sponsored by NTT ICT
WEBCAST: In this CeBIT Conference video, hear from Paul Miller, VP of Marketing Converged Data Center Infrastructure at HPE, as he examines the performance and resource management potential of the composable infrastructure. Watch now and discover what this infrastructure approach can do for your business.
Posted: 10 Aug 2016 | Premiered: Mar 18, 2016

NTT ICT

Cybersecurity Evolves: Risk in the Age of Dark Data, IoT and Advanced Analytics
sponsored by SearchSecurity.com
VIRTUAL SEMINAR: This virtual event, produced jointly by ISACA, SearchSecurity.com, and SearchCompliance.com focuses on the big changes impacting today's cyber security practices. The day's agenda is expressly designed to identify and develop risk management strategies specifically tailored to mitigate the threats your business will inevitably face.
Posted: 28 Jul 2016 | Premiered: 20 Jul 2016

SearchSecurity.com

Don't Get Taken for a Ride: Finding the Right Hyperconverged Solution
sponsored by Hewlett Packard Enterprise
VIDEO: Tune into this video to find out how implementing a hyperconverged system in your data center can simplify and speed your IT infrastructure while lowering costs and accelerating the pace of your business. View now to use HCI to quickly add capacity to your infrastructure, and manage the rollercoaster of demands in today's digital economy.
Posted: 23 Jun 2016 | Premiered: 30 May 2016

Hewlett Packard Enterprise

5 Security Best Practices Every Developer Needs to Know
sponsored by CloudMine
WEBCAST: Arm yourself with 5 security best practices that have been derived from the last three years of encountering, identifying, and neutralizing threats to mobile applications.
Posted: 28 Jun 2016 | Premiered: Jun 22, 2016


SAN 2016 Incident Response Survey: The Current Threat Landscape and Survey Results
sponsored by Intel Security
WEBCAST: A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as dwell time, automation, and more. Explore the survey's results in this webcast to uncover critical findings about the current threat landscape, the rise of ransomware, and "smash and grab" attack vectors.
Posted: 26 Sep 2016 | Premiered: Jun 8, 2016

Intel Security

Splunk Everywhere! OS Monitoring in the Cloud
sponsored by Splunk
WEBCAST: Get a holistic view of your cloud environment.
Posted: 08 Aug 2016 | Premiered: Aug 8, 2016

TOPICS:  IT Management
Splunk

Increase productivity in a mobile world
sponsored by HPE and IntelĀ®
WEBCAST: Supporting mobility is the key ingredient to increase employee productivity. Discover the challenges you face in implementing an effective mobile strategy and the 4 key steps to increase productivity.
Posted: 03 Jun 2016 | Premiered: Jun 3, 2016

HPE and IntelĀ®

Disrupting in the Digital Economy with an API Strategy
sponsored by IBM
WEBCAST: This webcast explores the use of an integrated creation, runtime, management, and security foundation for enterprise grade APIs and microservices. Unlock the value of existing IT investments to speed up development time, power modern digital apps, and expand brand reach.
Posted: 14 Jul 2016 | Premiered: Jul 14, 2016

IBM

Extending Your IT Infrastructure to the AWS Cloud
sponsored by Amazon Web Services
VIDEO: Find out how you can seamlessly and securely integrate cloud resources into your existing IT infrastructure. You'll learn how you can benefit from adopting a hybrid cloud architecture.
Posted: 02 Jun 2016 | Premiered: 13 Feb 2013

Amazon Web Services
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement