IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed    Add to Google    Add to My Yahoo!
SQL Injection Reports
Re-Thinking Your Data Flow Transmission for Security Risk and Compliance
sponsored by Axway
WHITE PAPER: In this white paper, discover why it's best to ditch file transfer protocol-based and personal file sync and share tools that increase risk for a data breach. Access now and discover how a managed file transfer approach offers modern, secure data flow transmission.
Posted: 22 Jul 2015 | Published: 22 Jul 2015


BYOD and Other Security Policies to Consider
sponsored by Absolute
EGUIDE: In this expert e-guide, you'll learn insider tips on how to better control mobile data inside and outside of the enterprise.
Posted: 17 Sep 2015 | Published: 02 Sep 2015


Enforce Security Policies in the Cloud with CASBS
sponsored by Elastica
EGUIDE: In this white paper, you will learn how cloud access security brokers (CASBs) provide policy-based enforcement points and controls to ensure public cloud apps are being accessed and used properly through authentication, encryption, and device profiling. View now to learn more about how to improve your cloud security strategy.
Posted: 15 Sep 2015 | Published: 08 Sep 2015


Application Session Filtering
sponsored by Gigamon
PRODUCT LITERATURE: This feature brief discusses a way to filter your applications in order to optimize application inspection and identification.
Posted: 20 Aug 2015 | Published: 20 Aug 2015


API Management Designed for the Cloud: Getting Started
sponsored by IBM
WHITE PAPER: This white paper highlights a multi-tenant cloud-based service for API development. Access this white paper to learn how to rapidly design, secure, manage, and analyze APIs to reach both internal and external developers.
Posted: 03 Sep 2015 | Published: 03 Sep 2015


10 Features Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This paper explains in detail the 10 features that every Web application firewall must provide.
Posted: 01 Oct 2015 | Published: 01 Oct 2015


The Cloud App Visibility Blind Spot
sponsored by Imperva
WHITE PAPER: This white paper covers the significant blindspot in visibility and increased risks for organizations in the face of "Shadow IT". In addition, this paper covers why traditional controls that secure your on-premise environment don't provide the required visibility into user activity and risks related to cloud app use.
Posted: 05 Oct 2015 | Published: 30 Sep 2015


Upgrades are Inevitable, Breaches Don't Have to Be
sponsored by IBM
RESOURCE: This checklist is an essential guide for securing company devices prior to new operating system releases. Uncover strategies to help you equip your organization with security capabilities that protect valuable information.
Posted: 15 Jul 2015 | Published: 15 Jul 2015


A Foundation for Next-Generation Datacenter and Cloud-Based Security
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about one ADC solution that offers many things, not the least of which is security.
Posted: 15 Jul 2015 | Published: 15 Jul 2015


Secure Content Collaboration on the Go
sponsored by IBM
WHITE PAPER: This white paper discusses the dangers of mobile content sharing and gives advice on what you can do to make it secure.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement