IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed    Add to Google    Add to My Yahoo!
SQL Injection Reports
 
Mobile, Cloud & Desktop Security: 3 Keys to Digital Success
sponsored by MobileIron
WHITE PAPER: What's holding so many organizations back from using mobile to its full potential? Mobile, cloud, and desktop security. Access this white paper to learn how to protect your critical data on any device, network, or cloud service so you can focus on delivering business value instead of reacting to security threats and fighting fires.
Posted: 05 May 2017 | Published: 30 Dec 2016

MobileIron

How to Secure Your Organization's Data in SaaS Apps
sponsored by OneLogin
WHITE PAPER: According to Cisco, IT departments are only aware of about 7% of their company's cloud app usage, leading to a massive security blind spot. Discover 10 steps on how to track sensitive corporate data in third-party SaaS apps and ensure that only the right people have the right level of access to it.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

Safe Adoption of Cloud Applications
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Gartner predicts that nearly 40% of enterprise IT application spend will be shifted to cloud versus on-premise by 2020. Access this white paper for major considerations you will need to focus on when looking for cloud app security.
Posted: 26 May 2017 | Published: 26 May 2017

Symantec & Blue Coat Systems

Sleeping with the Enemy: Achieving Agility and Security with DevSecOps
sponsored by WhiteHat Security
WEBCAST: To address the faster release demands of Agile, explore DevSecOps and how it effectively improves the collaboration between development, security, and operations teams. Learn how to strive towards continuous security, integrate app security tools, address the growing role of infrastructure as code, and more.
Posted: 26 Jul 2017 | Premiered: Jun 28, 2017

WhiteHat Security

The Requirements of a Secure Browser
sponsored by Authentic8, Inc.
VIDEO: Traditional web browsers weren't built with today's threats in mind, and the gaps in infrastructure are being exposed. In this brief video, learn the full requirements of a secure browser.
Posted: 02 Aug 2017 | Premiered: 09 Jun 2015

Authentic8, Inc.

Supporting Open Source App Delivery Tools with Commercial Extensions
sponsored by Cloudbees
RESEARCH CONTENT: This Forrester Research report explores how to support open source delivery tools with commercial extensions. From an in-depth survey of 150 app development and IT professionals, uncover 3 key findings about app security and the state of open source tools in the software delivery pipeline.
Posted: 17 Jul 2017 | Published: 31 Oct 2016

Cloudbees

Simplify Authentication with Personal Identity Verification
sponsored by HID
VIDEO: It's no secret that passwords are a pain for users and IT. This video discusses how personal identity verification (PIV) can make authentication simpler for your users.
Posted: 11 Aug 2017 | Premiered: 11 Aug 2017

HID

Top 5 Considerations: What to Look For in Mobile Banking Security
sponsored by HID
RESOURCE: Uncover 5 IAM considerations for choosing a mobile banking security tool. Also discover a concise market overview of mobile banking apps, including a look at opportunities for growth and major obstacles.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

HID

Deploying Java EE apps in cloud and container environments
sponsored by Red Hat
WHITE PAPER: Competitive companies are turning to DevOps, microservices, and containers to get the most from their Java apps. In this white paper, learn about Red Hat's fully-certified Java EE 7 application platform and how it was designed to be flexible enough to manage all these emerging priorities.
Posted: 05 Jul 2017 | Published: 05 Jul 2017

Red Hat

The Massive Mobile Migration
sponsored by IBM
WHITE PAPER: The move to mobile devices, data and apps to make work happen anytime, anywhere is continuing to experience massive adoption. Download this infographic to see the numbers you can't ignore this year.
Posted: 03 Mar 2017 | Published: 27 Apr 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement