IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed    Add to Google    Add to My Yahoo!
SQL Injection Reports
 
The Evolution of Cloud Security: Perception vs. Reality
sponsored by BitGlass
WHITE PAPER: This survey of over 2,200 cybersecurity professionals offers insight into both the current perception and the reality of cloud security. Access now to learn more about how security is catching up with cloud apps, and affecting areas like shadow IT, legacy security tools, popular business apps like Office 365, and more.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

Virtualize Skype for Business for Secure Unified Communications
sponsored by Citrix
RESOURCE: Did you know that when virtualized, sensitive chat logs and file exchanges are securely stored in the datacenter? Learn how to establish a secure foundation for collaboration by virtualizing Skype for Business—providing the control and infrastructure visibility you crave for VDI.
Posted: 19 Dec 2016 | Published: 19 Dec 2016

Citrix

Make EMM Part of a Broader Mobile Enterprise Strategy
sponsored by Microsoft
EGUIDE: If management is the centerpiece of your mobile enterprise strategy, you're doing it wrong. Learn how adding MAM and MCM capabilities to your EMM strategy can help you enforce mobile security policies, but also enable your workers to be more productive, transforming how your business operates.
Posted: 10 Jun 2016 | Published: 03 Jun 2016

Microsoft

Open Source Software Support: Top Challenges and Best Practices
sponsored by Rogue Wave Software
WHITE PAPER: This report takes real support data from hundreds of open source software (OSS) packages across different organizations to analyze the statistics, realities, and results of open source in the field. Learn how to provide effective support for OSS by tackling the top challenges identified in the survey's data and uncover 5 OSS support best practices.
Posted: 23 Nov 2016 | Published: 31 Dec 2015

Rogue Wave Software

3 Ways to Migrate SAP to Microsoft Azure
sponsored by Freudenberg IT
WHITE PAPER: Business agility, innovation, cost reductions, scalability, and shadow IT: These 5 critical areas can be largely impacted and improved upon by leveraging cloud services and SaaS. Explore 3 ways to bring these benefits to SAP management by hosting mission-critical SAP apps in the cloud with Microsoft Azure.
Posted: 09 Dec 2016 | Published: 31 May 2016

Freudenberg IT

Top Lessons from 2016: How to Accelerate Digital Transformations
sponsored by Hewlett-Packard Enterprise
EBOOK: Discover how to implement faster digital transformations with strategies for accelerating time to value, insights, trust, and engagement. Uncover some of the top lessons learned from 2016 for faster app delivery, DevOps, Agile development, IT management, hybrid cloud computing, big data, and more.
Posted: 06 Jan 2017 | Published: 06 Jan 2017

Hewlett-Packard Enterprise

The Rise of Cloud-Based Application Security Vulnerabilities
sponsored by Onapsis
EGUIDE: This e-guide explores the vulnerabilities presented by mobile apps, and the steps security professionals can take to ensure those vulnerabilities are not exploited. Find out how you can improve your security practices by focusing on protecting mobile devices, discovering vulnerabilities without the aid of an HTTP(S) interface, and more.
Posted: 12 Sep 2016 | Published: 06 Sep 2016

Onapsis

Malware Hitching a Ride on Mobile Apps?
sponsored by SearchSecurity.com
EBOOK: The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
Posted: 27 Jun 2016 | Published: 20 Jun 2016

SearchSecurity.com

QRadar: Expert SIEM Product Overview
sponsored by IBM
EGUIDE: Looking for all the security features IBM's security information and event management (SIEM) tool has to offer? Look no further. Principal consultant, Karen Scarfone takes an unbiased look into QRadar. Learn how its features allow easy collection of log data from hosted assets, operating systems, applications, vulnerabilities, and user behavior.
Posted: 23 Jun 2016 | Published: 01 May 2016

IBM

Building a Strong Application Security Program
sponsored by Onapsis
EGUIDE: What are the first steps to creating a strong app security program, and how do you know you've struck the right balance between static and dynamic testing? These are the types of questions we explore in this e-guide. Find out what role education is playing in building an app security program and get advice for mitigating SAP vulnerabilities.
Posted: 12 Sep 2016 | Published: 09 Sep 2016

Onapsis
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement