IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

XSS

RSS Feed    Add to Google    Add to My Yahoo!
XSS Multimedia (View All Report Types)
 
Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

Vulnerability Chaining: Evaluating Low and Moderate Threat Vulnerabilities with Threat Risk Modeling
sponsored by White Hat Security
WEBCAST: In this webcast, vulnerability guru Caleb Watt of the Threat Research Center will walk you through how threat modeling can keep your company safe from dangerous attack chaining.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

White Hat Security

Simplify Saas and On-premises Integration
sponsored by Oracle Corporation
WEBCAST: Software as a Service (SaaS) is growing in popularity and is driving the need for new SaaS apps to be easily integrated with existing on-premises counterparts. This video introduces middleware that simplifies integration and enforces consistency through a common integration platform for SaaS and on-premise apps.
Posted: 13 May 2015 | Premiered: May 19, 2014, 01:17 EDT (05:17 GMT)

Oracle Corporation

Device and Data Protection - Part 1
sponsored by Dell, Inc. and Intel®
WEBCAST: Inside this webcast, explore endpoint and data security, including current market trends. Find out what Dell is doing in the security industry and learn about their data protection portfolio which includes encryption, malware prevention, and authentication technology that allows them to provide the most secure PC available on the market.
Posted: 23 Apr 2015 | Premiered: Apr 23, 2015

Dell, Inc. and Intel®

Hospitals Deliver a Secure, Mobile Workspace to Their Staff with VDI
sponsored by Dell, Inc.
VIDEO: Inside this video, discover how they implemented a desktop virtualization solution to deliver secure virtual desktops to their clinicians. Find out how this technology enabled easy, rapid login while securing sessions so they could move around and switch to different workstations seamlessly.
Posted: 20 Mar 2015 | Premiered: 20 Feb 2015

Dell, Inc.

Mitigate Software Vulnerabilities with Virtual Patching
sponsored by Trend Micro
WEBCAST: This webcast discusses best practices for implementing virtual patching in a way that optimizes security without causing any system downtime.
Posted: 11 May 2015 | Premiered: May 11, 2015

Trend Micro

How-To Video: Creating Web Security Manager for Azure
sponsored by Alert Logic
VIDEO: This brief video analyzes the problem and discusses how you can implements a better web application firewall that will catch even the most advanced threats.
Posted: 20 Mar 2015 | Premiered: 22 Jul 2014

Alert Logic

Building a Layered Defense Against Data Breaches
sponsored by Absolute Software
WEBCAST: This webcast explores how a tri-layered security strategy can help protect you from a continuous barrage of malware. View now to learn why encryption is not enough to protect data and why endpoint security can pick up where traditional perimeter defenses leave off.
Posted: 05 May 2015 | Premiered: Dec 15, 2014

Absolute Software

Deliver Service Management and Unified Endpoint Management Software from a Single Platform
sponsored by FrontRange Solutions Inc.
VIDEO: This video discusses how IT can deploy service management and unified endpoint management software both on-premise and in the cloud from a single platform, allowing for greater automation and streamlined operations.
Posted: 20 Apr 2015 | Premiered: 13 Nov 2014

FrontRange Solutions Inc.

Top 10 Web Hacking Techniques of 2014
sponsored by White Hat Security
WEBCAST: In this webcast, you'll learn the top 10 web hacking techniques of 2014 and how to protect your network as we continue through 2015.
Posted: 09 Apr 2015 | Premiered: Apr 9, 2015

White Hat Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
XSS White Papers | XSS Multimedia | XSS IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement