IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed    Add to Google    Add to My Yahoo!
SQL Injection Reports
Web Security: Fighting Off Zero Day Attacks
sponsored by WhiteHat Security
WEBCAST: Join web security guru Robert Hansen in this webinar for an in-depth explanation of the many vulnerabilities you may not have considered, and to discover how you can better protect your newly-built websites and applications. View now to learn how to stop attacks like Heartbleed, SQL injection, command injection, and more.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Solidify Your Network Protection with Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper you will learn the ins and outs of deploying an ISFW. Learn how to protect your company from the latest advanced security threats and compartmentalize access to sensitive data and apps.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

The Power of Collaboration with an Expiration Date and Data-Centric Security
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will learn the role of data-centric security in expiration collaboration. Access this paper now to see why the movement of consumers to apps like Snapchat clearly presages a similar move for enterprises to EFSS tools with real expiration built in.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


Improve Performance and Resiliency of Web Apps with ADC Network Appliances
sponsored by Citrix
WHITE PAPER: This white paper This step by step guide reviews an application delivery controller network appliance that will enhance the performance and scalability of your mobile and cloud deployments. Learn how to optimize, secure, and control the delivery of all enterprise services with your existing network.
Posted: 27 Oct 2015 | Published: 31 Oct 2014


Keep Mobile Apps Safe With These Security Best Practices
sponsored by WhiteCryption
EGUIDE: Access this expert guide for advice on solving your mobile security challenges through better mobile app protection.
Posted: 24 Nov 2015 | Published: 24 Nov 2015


Device Fingerprinting: A New Tool for Enhanced Application Protection
sponsored by Radware
WHITE PAPER: This white paper outlines the 5 common factors challenging IP-based identification and presents an overview of device fingerprinting to gather IP-agnostic information to detect malicious sources and users. View now and discover how to mitigate today's top app threats including, web scraping, bots, DDoS, and more.
Posted: 19 Nov 2015 | Published: 05 Jan 2015


Webinar: The Importance of Identity Management within an Office 365 Implementation
sponsored by Ping Identity Corporation
WEBCAST: Examine the pros and cons of each Microsoft Office 365 IAM approaches as well as a 5 question IAM self-evaluation guide to aid you in building your strategy. Discover the IAM requirements to secure access beyond Office 365 as well as third-party approaches that may bring you closer to your security goals.
Posted: 26 Oct 2015 | Premiered: Sep 30, 2015

Ping Identity Corporation

When Business is the App, the App is the Business: Securing Enterprise Apps
sponsored by IBM
WHITE PAPER: In this report, you will learn the key security dangers enterprise mobile apps face, and find out how to eliminate these threats them in your app-driven business. Access this comprehensive white paper now to optimize the use of apps in your business.
Posted: 07 Oct 2015 | Published: 07 Oct 2015


20 Critical Controls for Effective Cyber Defense
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores how you can obtain versatile and comprehensive security by adopting twenty essential security controls.
Posted: 04 Nov 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Solving the App Gap to Ensure Enterprise Mobility Success
sponsored by StarMobile
WHITE PAPER: This white paper explains how to solve the "app gap" that exists between application virtualization and endpoint security in a largely BYOD world. Learn about three emerging technologies that aim to solve these mobile enterprise limitations.
Posted: 20 Oct 2015 | Published: 20 Oct 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement