IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Cross Site Scripting

RSS Feed    Add to Google    Add to My Yahoo!
Cross Site ScriptingMultimedia (View All Report Types)
 
Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

5 Key Considerations in Delivering Enterprise Class Cloud Services
sponsored by Egenera
WEBCAST: Watch this informative webcast to find out five key considerations for organizations considering cloud service providers.
Posted: 13 Aug 2014 | Premiered: Feb 27, 2013

Egenera

A Hybrid ITSM Solution Designed to Meet Your Needs
sponsored by FrontRange Solutions Inc.
VIDEO: This video explores a flexible, hybrid solution that can solve your ITSM needs. Watch now to learn how the automated service delivery lifecycle workflow can save you time and money.
Posted: 29 Jul 2014 | Premiered: 06 Feb 2013

FrontRange Solutions Inc.

Best Practices for Enterprise Data Protection in the Cloud
sponsored by Druva Software
WEBCAST: Watch this webcast to get advice from a panel of cloud service provider CEOs and cloud experts. The panel provides the best practices for protecting enterprise data in the cloud.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014, 01:01 EDT (05:01 GMT)

Druva Software

See what Security, Reliability and Efficiency looks like
sponsored by IBM and Intel.
WEBCAST: Tune in to this exclusive webcast to hear industry veterans examine a new server system that uses innovative new technology to provide enterprise-class data protection.
Posted: 26 Aug 2014 | Premiered: Sep 8, 2014

IBM and Intel.

Webcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
WEBCAST: In this webcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

Can Text Messaging Improve Communication Between Health Care Professionals?
sponsored by Imprivata
VIDEO: Watch this brief video and hear from Linda Reed, the VP/CIO of Atlantic Health on they implemented a text messaging system to deliver information instantly, and how it revolutionized their means of communication.
Posted: 11 Aug 2014 | Premiered: 11 Aug 2014

Imprivata

How Effective Systems Management Can Improve your Infrastructure Speed
sponsored by Dell, Inc. and IntelĀ®
VIDEO: This exclusive video details some systems management tools from Dell that will help improve your IT infrastructure speed.
Posted: 19 Sep 2014 | Premiered: 19 Sep 2014

Dell, Inc. and IntelĀ®

Unified Threat Management Provides Simplified Management and Increase Security
sponsored by Sophos, Inc.
SOFTWARE DEMO: Check this software trial download to experience firsthand how new UTM solutions can help boost your current security solution with centralized management, flexible deployment, and high performance.
Posted: 18 Sep 2014 | Premiered: 18 Sep 2014

Sophos, Inc.

Emerging Trends Radar Screen
sponsored by Gartner
WEBCAST: Tune in to this in-depth Gartner webcast to learn about emerging trends and how consumerization and mobile devices are driving innovation in the enterprise, and how you can tap into these rising trends to take your organization to the next level.
Posted: 02 Jul 2014 | Premiered: Jul 2, 2014, 01:00 EDT (05:00 GMT)

Gartner
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement