IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

XSS

RSS Feed    Add to Google    Add to My Yahoo!
XSS Multimedia (View All Report Types)
 
Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

Remote Support Services: The Antidote to Growing IT Complexity
sponsored by LogMeIn Rescue
VIDEO: According to a survey by IDG, both IT and support desk professionals are struggling to keep end users happy, lower operational costs and more, because of today's new technology and devices. So what can be done to support these professionals? View this webcast to learn more about remote IT support.
Posted: 01 Mar 2017 | Premiered: 30 Dec 2016

LogMeIn Rescue

Technology-driven business strategy vs. busines-driven technology strategy
sponsored by BDNA
WEBCAST: This informative webcast sheds some light not only on the difference between business-driven technology strategies versus technology-driven business strategies but when it is ideal to use them. It also stresses the importance of ITAM, and how ITAM paired with the IT team in your enterprise can prove to be a powerful combination.
Posted: 04 Nov 2016 | Premiered: Jul 27, 2016

BDNA

Timing the Perfect ADC Vendor Refresh
sponsored by A10 Networks
WEBCAST: Today's market is all about the app, and consumers care about one thing: accessing them from anywhere, anytime, and above all - securely. Learn how a smart application delivery controller vendor refresh will improve performance, security, management and support..
Posted: 14 Feb 2017 | Premiered: Oct 28, 2016

A10 Networks

A CISO Perspective: Why Unified Security Solutions are a Necessity
sponsored by Forcepoint
WEBCAST: Get a solid look at the market drivers that are favoring the adoption of unified security, as well as the technical and operational blueprints for a successful unified security policy.
Posted: 17 Feb 2017 | Premiered: Feb 17, 2017

Forcepoint

Top 5 Risk Mitigations In a Cloud-First World
sponsored by Forcepoint
WEBCAST: Dive head-first into risk mitigation in the cloud with this webcast featuring 451 Research Analyst, Adrian Sanabria as he discusses 5 ways to make sure your cloud is secure and handled properly.
Posted: 16 Feb 2017 | Premiered: Feb 16, 2017

Forcepoint

Safeguard Data Across the Board Through Smarter Authorization Enablement
sponsored by HID
WEBCAST: Identity and access management has never been more important. Discover how to rapidly allow for provisioning, de-provisioning, and issuing of user credentials, protect access to your organization's desktops, network, and applications, benefit from digital signatures and encryption, and more.
Posted: 27 Mar 2017 | Premiered: Mar 27, 2017

HID

Deploy IT Asset Management Program in 30 Days
sponsored by BDNA
WEBCAST: This informational webcast talks about how you can establish an ITAM program, some of the steps in the process, the benefits of being prepared for an audit, and how to accomplish the deployment of this program quickly, but not disrupt your organization while doing so.
Posted: 02 Nov 2016 | Premiered: Mar 28, 2016

BDNA

Road Map: The Data Security and Privacy Playbook
sponsored by IBM
WEBCAST: Consider these five key characteristics when modernizing your legacy file transfer environment with MFT technology.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Consider These Use Cases When Selecting Your MFT Technology
sponsored by IBM
WEBCAST: Gartner shares the key challenges and recommendations in selecting the right MFT solution for your organization.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
XSS White Papers | XSS Multimedia | XSS IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement