IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Cross Site Scripting

RSS Feed    Add to Google    Add to My Yahoo!
Cross Site Scripting Multimedia (View All Report Types)
 
Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

ASG- Perfman: Health Insurance Provider
sponsored by ASG
VIDEO: This video examines how a major healthcare provider was able to vastly improve their ability to analyze and react to short-term and historical data by deploying Perfman.
Posted: 21 Aug 2015 | Premiered: 21 Aug 2015

ASG

Using Big Data for Data Security
sponsored by Splunk
WEBCAST: This webcast demonstrates how to accurately determine the threat activity your organization faces.
Posted: 02 Sep 2015 | Premiered: Jan 16, 2014

Splunk

Monitoring Citrix Mobile Workspace with System Center
sponsored by ComTrade
VIDEO: This webcast discusses a management and monitoring platform for Citrix Workspace Suite. Find out how its capabilities cover the Workspace suite components around workforce mobility and see a demo of each component.
Posted: 12 Aug 2015 | Premiered: 22 May 2015

ComTrade

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 30 Jul 2015 | Premiered: Jul 1, 2015

WhiteHat Security

How to Simplify PCI DSS Compliance with AlienVault USM
sponsored by AlienVault
WEBCAST: In this informative webinar, explore how to adjust your PCI DSS compliance strategy to eliminate complexities and protect customer data.
Posted: 31 Jul 2015 | Premiered: Jul 2, 2015

AlienVault

Case Study: Health Insurer Innovates its Endpoint Security
sponsored by CrowdStrike
VIDEO: This brief video describes how a major healthcare provider updated its security with a next generation endpoint protection platform.
Posted: 03 Aug 2015 | Premiered: 31 May 2015

CrowdStrike

The Secure Mobile Enterprise
sponsored by Dell, Inc.
VIDEO: This video describes how you can achieve the goal of creating a secure mobile enterprise.
Posted: 15 Jul 2015 | Premiered: 15 Jul 2015

Dell, Inc.

The CIO Agenda for 2015
sponsored by Gartner
WEBCAST: View this exclusive Gartner Symposium presentation to learn what should be on the agenda for CIOs in 2015.
Posted: 05 Jun 2015 | Premiered: Jun 5, 2015

Gartner

Building an IT Infrastructure for SAP HANA with Dell and Red Hat
sponsored by Red Hat, Dell and SAP
WEBCAST: This webcast discusses how you can retailor your IT infrastructure and architecture to meet the needs of SAP HANA and speed up your business.
Posted: 12 Aug 2015 | Premiered: Jul 31, 2015

Red Hat, Dell and SAP
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement