IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Cross Site Scripting

RSS Feed    Add to Google    Add to My Yahoo!
Cross Site Scripting Multimedia (View All Report Types)
 
Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

Future Proof Your Dashboard: Achieve Long-Term IT & Business Alignment
sponsored by TeamQuest Corporation
PODCAST: Explore the insights about business value dashboards as described by Rich Razon, Head of Business Development at TeamQuest. Learn why organizations of all kinds can leverage dashboards to turn operations metrics into business value metrics, enabling business leaders to gain clarity into the way IT is or isn't propelling the organization forward.
Posted: 02 Jun 2016 | Premiered: May 16, 2016

TeamQuest Corporation

Managed Security
sponsored by MASERGY
WEBCAST: The threat landscape is growing and network security is already a full-time job. Watch this 2 minute webcast to learn about a managed security service and how it bolsters your defenses, preparing you to handle whatever attacks come your way.
Posted: 02 Jun 2016 | Premiered: Jun 1, 2016

MASERGY

How the HC380 is Changing the Hyper-Converged Market
sponsored by Hewlett Packard Enterprise
VIDEO: This video dives into one particular hyper-converged system and examines how it's changing the market unlike any other system in the field. View now and learn what the hyper-converged market holds in the future.
Posted: 11 May 2016 | Premiered: 11 May 2016

Hewlett Packard Enterprise

Transforming Your Data-Driven IT Organization
sponsored by Windsor Group
VIDEO: Tune into this video to learn how to transform your data-driven organization and service delivery by leveraging the market insight and expertise of one ITSM provider. Learn how to determine the best ITSM sourcing strategy for you, and transform your IT operations with an alternative delivery and market pricing model evaluation.
Posted: 16 May 2016 | Premiered: 16 May 2016

Windsor Group

Video: Advanced Endpoint Protection & Forensics
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video invites you to uncover key strategies for continuously preventing even the most sophisticated attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.
Posted: 24 Mar 2016 | Premiered: 08 Feb 2016

Check Point Software Technologies Ltd.

Building a Solid Foundation for Service Management
sponsored by ServiceNow
VIDEO: In this webcast, Andy Garrett, Head of IT Service Development at Travis Perkins Plc, explains how they modernized their ITSM strategy. Tune in to discover the key factors that set them up for success.
Posted: 01 Mar 2016 | Premiered: 24 Nov 2015

ServiceNow

Micro-Segmentation: A Demonstration
sponsored by Unisys
VIDEO: This video illustrates how to micro-segment a network. Discover ways micro-segmentation cryptographically isolates your valuables down to the smallest levels, and organizes them into functional communities so that only the right people can do the right things.
Posted: 26 May 2016 | Premiered: 09 Nov 2015

Unisys

Take the First Steps Toward Effective SIAM
sponsored by ServiceNow
VIDEO: In this brief video, an industry expert explains why an effective Service Integration and Management (SIAM) function is more than just vendor management. Tune in for best practices on how to get started with SIAM.
Posted: 26 Feb 2016 | Premiered: 27 Nov 2015

ServiceNow

Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WEBCAST: Join Cisco's Cyber Security Specialist, Charles Herring, to learn how network behavioral anomaly detection (NBAD) and deep visibility through NetFlow can be used to quickly alert administrators to these violations.
Posted: 18 Feb 2016 | Premiered: Jan 27, 2016

Lancope
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement