IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed    Add to Google    Add to My Yahoo!
SQL Injection Reports
 
Cloud, Mobility, Big Data: Future Proof Your Organization with Consolidation
sponsored by Matrix42
WHITE PAPER: This white paper explores how to optimize all of your existing workflows and manage them effectively. In the face of growing big data, cloud, and mobile adoption, learn how to leverage a business process automation platform for hybrid environments that facilitates integrations, boosts compliance, and enhances reporting.
Posted: 22 Feb 2017 | Published: 31 Dec 2015

Matrix42

How to Keep up with Governance, Risk, and Compliance in the face of Faster App Development
sponsored by SearchMicroservices
EBOOK: This handbook explores how to implement holistic governance, risk, and compliance (GRC) for SOA and microservices by leveraging ALM, APIs, and Web Services Security. Learn more about microservices and how they're changing the world of app security.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

SearchMicroservices

IT Project ASEAN: App Development
sponsored by ComputerWeekly.com
EGUIDE: In this guide, we show you some of the technologies helping businesses to release and deploy new applications as swiftly as possible, without disrupting business operations. From containers to microservices and DevOps, many organizations are now embracing these flexible and agile approaches.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

ComputerWeekly.com

Securing the Most Important Apps and Data—Yours
sponsored by Citrix
RESOURCE: Discover a digital workspace that promotes exceptional user experience by delivering apps, data, and complete desktops available on any device, over any network. Read on to empower seamless, secure, and productive work that flexes for your workloads (whether on-premises, cloud, or hybrid).
Posted: 26 Jan 2017 | Published: 26 Jan 2017

Citrix

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PODCAST: Tune into this podcast to hear from health IT industry leaders as they discuss how application virtualization is reshaping care delivery and improving IT security.
Posted: 01 Dec 2016 | Premiered: Nov 17, 2016

Citrix and Pure Storage

QRadar: Expert SIEM Product Overview
sponsored by IBM
EGUIDE: Looking for all the security features IBM's security information and event management (SIEM) tool has to offer? Look no further. Principal consultant, Karen Scarfone takes an unbiased look into QRadar. Learn how its features allow easy collection of log data from hosted assets, operating systems, applications, vulnerabilities, and user behavior.
Posted: 23 Jun 2016 | Published: 01 May 2016

IBM

The Rise of Cloud-based Application Security Vulnerabilities
sponsored by Symantec + Blue Coat
EGUIDE: While it can be beneficial to store app data in the cloud, it's causing many security concerns because of the sensitive nature of the information. Explore this e-guide to learn common vulnerabilities in cloud-based apps and best practices for properly protecting app data.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

Symantec + Blue Coat

Trends in SAP Cybersecurity
sponsored by IBM
WHITE PAPER: The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 29 Aug 2016 | Published: 01 Feb 2016

IBM

The Rise of Cloud-Based Application Security Vulnerabilities
sponsored by Onapsis
EGUIDE: This e-guide explores the vulnerabilities presented by mobile apps, and the steps security professionals can take to ensure those vulnerabilities are not exploited. Find out how you can improve your security practices by focusing on protecting mobile devices, discovering vulnerabilities without the aid of an HTTP(S) interface, and more.
Posted: 12 Sep 2016 | Published: 06 Sep 2016

Onapsis

Malware Hitching a Ride on Mobile Apps?
sponsored by SearchSecurity.com
EBOOK: The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
Posted: 27 Jun 2016 | Published: 20 Jun 2016

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement