IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

XSS

RSS Feed    Add to Google    Add to My Yahoo!
XSS Multimedia (View All Report Types)
 
Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

Steps to Secure the Industrial Internet of Things
sponsored by Bayshore Networks
VIDEO: By taking the complex physical machinery of manufacturing and connecting it to your network, you can drive down costs and unlock new levels of insights into sensor data. However, more connected devices also means more risk. Watch this brief video to learn about IDC's steps for securing industrial IoT (IIoT).
Posted: 30 May 2017 | Premiered: 29 Nov 2016

Bayshore Networks

Tool Consolidation Webinar
sponsored by LogicMonitor
VIDEO: Running an IT environment requires many tools. In an era with emphasis speed and lowering your time-to-market, you need to consolidate your tools into a more manageable system. Watch this webinar to learn how to consolidate your tools into a single system that enables you to work faster, how you stand to benefit, and more.
Posted: 02 Nov 2017 | Premiered: 02 Nov 2017

LogicMonitor

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID Global
VIDEO: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: 27 Mar 2017

HID Global

A Q&A About a Data Visibility System for AWS
sponsored by Gigamon
WEBCAST: Does cloud migration really mean loss of visibility and control over your data? Get this question answered in this Q&A webcast as well as explore the ins and outs of an individual visibility program for cloud security in AWS.
Posted: 06 Apr 2017 | Premiered: Nov 22, 2016

Gigamon

Automating Your Corporate Mobility Management
sponsored by Cisco Jasper
WEBCAST: In this webcast, discover how the mobile workforce is impacting corporate mobility management needs, and costs, and how enterprises are addressing this challenge with an automated mobility management platform.
Posted: 28 Jun 2017 | Premiered: Jun 22, 2017

Cisco Jasper

Video Overview: Container as a Service
sponsored by Tata Communications and Intel
VIDEO: Tune into this video to view the complete features of one Container as a Service (CaaS) offering, which unites the needs of both IT admins and developers to manage ops risk through complete control of secure image registry, port app workloads across geographies, and more.
Posted: 04 Dec 2017 | Premiered: 09 Oct 2017

Tata Communications and Intel

How to Quickly Advance Your Security Posture
sponsored by Splunk
WEBCAST: In this webcast, explore a free, highly accessible app that can give you successful security analytics that offer you time series analysis, simpler and machine learning based detection, and more. Then, watch 2 demos of this system in action.
Posted: 16 Oct 2017 | Premiered: Sep 29, 2017

Splunk

Make Your Data More Valuable with Real-Time Analytics
sponsored by IBM
WEBCAST: Gain an understanding of real-time analytics and learn how to derive maximum benefit from your most valuable data.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management
IBM

Visual Digital Platforms: Crucial Technology to Eliminate Poverty
sponsored by Hewlett-Packard Enterprise
VIDEO: See how Foundation Paraguay helps thousands of families overcome poverty with digital services and a bottom-up approach.
Posted: 30 Jan 2017 | Premiered: 30 Jan 2017

TOPICS:  IT Management
Hewlett-Packard Enterprise
 
Browse by Report Type:
XSS White Papers | XSS Multimedia | XSS IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement