IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed   
SQL Injection Multimedia (View All Report Types)
 
Cybersecurity: It's a Team Sport
sponsored by WhiteHat Security
WEBCAST: During the pandemic, cybercrime has quadrupled, leaving many organizations scrambling to strengthen their security posture. In this webinar, learn why it’s more important than ever for vendors, partners and customers to work together and build a true cybersecurity team to combat the evolving threat landscape.
Posted: 03 Dec 2020 | Premiered: Dec 3, 2020

WhiteHat Security

Demystifying DevSecOps practices and tooling in container environments
sponsored by Red Hat
VIRTUAL SEMINAR: Red Hat believes that the purest DevOps out there is DevSecOps, which requires a cultural transformation. Watch the webinar to learn about DevSecOps practices and tools in container environments.
Posted: 13 Aug 2021 | Premiered: 13 Aug 2021

Red Hat

Don't be Afraid of Cloud Security
sponsored by Apcela
WEBCAST: The push to move applications and services to the cloud often opens security vulnerabilities that you read about as headlines. Conversely, the fear of these security events results in network policy that inhibits the speed and performance of business. Watch this webcast for a discussion on balancing speed and security from a CIO’s perspective.
Posted: 07 Oct 2020 | Premiered: Oct 31, 2019

Apcela

DevSecOps Framework – Technical Deep Dive
sponsored by WhiteHat Security
WEBCAST: Organizational infrastructure is becoming more and more vulnerable, and as a result, development teams are searching for ways to securely develop, build and deploy business-driving applications. So, what can these teams do to get started? They can begin by watching this webcast to learn the keys to a successful DevSecOps implementation.
Posted: 16 Nov 2020 | Premiered: Nov 16, 2020

WhiteHat Security

Security Process Overview of the Neptune DX Platform
sponsored by Neptune Software
VIDEO: The Neptune DX platform offers its users a variety of speedy low-code development options. But how does it ensure that your systems remain safe? Watch this short video to learn how the security features of Neptune DX work, and learn the three different levels they use to manage security.
Posted: 08 Apr 2020 | Premiered: 03 Mar 2020

Neptune Software

Webinar - Defend better and respond faster with security that works together
sponsored by Cisco Umbrella
WEBCAST: Most malware infections happen in one of only 3 ways, so why aren’t they easier to stop? As organizations embrace the cloud, it’s now imperative to find a new approach to securing users and devices. View this webinar to find out how to stop attacks before they start and how to safeguard your organization with a layered approach to cybersecurity.
Posted: 31 Jul 2020 | Premiered: Jul 14, 2020

Cisco Umbrella

Reduce API Security Risks with Automated and Continuous API Scanning
sponsored by WhiteHat Security
WEBCAST: Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent history. How do we reduce API security risks? View this webcast to learn why testing may be the key.
Posted: 20 Nov 2020 | Premiered: Jul 15, 2020

WhiteHat Security

Best Practices for Protecting Microsoft Exchange
sponsored by Symantec Corporation
WEBCAST: The right data management solution can offer the right tools to help manage your applications in an efficient manner. This webcast offers best practices and solutions that bring the peace of mind that data is protected and readily recoverable.
Posted: 17 May 2006 | Premiered: Mar 23, 2006

Symantec Corporation

Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business
sponsored by IBM
WEBCAST: This crucial webcast examines how you can protect existing and developing applications and provides some best practices for ensuring end-to-end application security.
Posted: 19 Jul 2013 | Premiered: Jul 19, 2013

IBM

Safe & Secure: An Overview of Security Features In JBoss Application Platforms
sponsored by Red Hat
WEBCAST: Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.
Posted: 08 Jul 2010 | Premiered: Jul 8, 2010

Red Hat
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences