IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

XSS

RSS Feed    Add to Google    Add to My Yahoo!
XSS Multimedia (View All Report Types)
 
Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

ASG- Perfman: Health Insurance Provider
sponsored by ASG
VIDEO: This video examines how a major healthcare provider was able to vastly improve their ability to analyze and react to short-term and historical data by deploying Perfman.
Posted: 21 Aug 2015 | Premiered: 21 Aug 2015

ASG

What to Do When Anti-Virus Isn't Enough
sponsored by Malwarebytes Corporation
VIDEO: Recently, cybercriminals have learned how to get around most anti-virus software, making traditional security measures too weak to really protect you. Take a look at this brief video to learn how you can add anti-malware to the anti-virus you're already using for an added layer of protection.
Posted: 07 May 2015 | Premiered: 03 Jun 2013


Building an IT Infrastructure for SAP HANA with Dell and Red Hat
sponsored by Red Hat, Dell and SAP
WEBCAST: This webcast discusses how you can retailor your IT infrastructure and architecture to meet the needs of SAP HANA and speed up your business.
Posted: 12 Aug 2015 | Premiered: Jul 31, 2015

Red Hat, Dell and SAP

Mitigate Complexity, Reimagine IT
sponsored by SAP America, Inc.
WEBCAST: In the following webcast, Carl Dubler demonstrates five technologies that promote innovation in IT. Tune in to discover details about simple data models, the modern user experience, and more.
Posted: 11 Aug 2015 | Premiered: Aug 11, 2015

SAP America, Inc.

Free Demo: Enhancing Data Protection with Enterprise Storage Management
sponsored by IBM
SOFTWARE DEMO: Take a look at this free demo to discover how the right storage manager can help you overcome the challenges of enterprise data protection.
Posted: 10 Jul 2015 | Premiered: 10 Jul 2015

IBM

Cyber Risk Intelligence Tailored For Your Business
sponsored by SurfWatch Labs
VIDEO: This brief video explains how cyber intelligence can help your organization gain a stronger understanding of the cyber risks it faces.
Posted: 13 Jul 2015 | Premiered: 12 Sep 2014

SurfWatch Labs

Redefining Enterprise Storage Management with the Cloud
sponsored by Nimble Storage
WEBCAST: In this webcast, Founder and Chief Scientist of DeepStorage Howard Marks analyzes current storage management capabilities in light of the emergence of flash storage, and leads a discussion with two customers about their experiences utilizing one storage management platform for automated support and predictive analytics.
Posted: 06 May 2015 | Premiered: Apr 17, 2015

Nimble Storage

Customer Spotlight: Deploying a Data Protection Program In Less Than 120 Days
sponsored by Digital Guardian
WEBCAST: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 09 Jun 2015 | Premiered: Nov 5, 2014

Digital Guardian

How the Hackers Get In: Experiences from Real-Life Security Breaches
sponsored by Dell SecureWorks
VIDEO: In this video, an information security expert discusses the results of his research to reveal hackers' most common motives and techniques.
Posted: 08 Jul 2015 | Premiered: 08 Jul 2015

Dell SecureWorks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
XSS White Papers | XSS Multimedia | XSS IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement