Cross Site Scripting

Cross Site Scripting White Papers (View All Report Types)
Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

The Anatomy of a Cross-Site Scripting Campaign
sponsored by Imperva
WHITE PAPER: XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Imperva

Impacts of Cyberattacks on IoT Devices
sponsored by Palo Alto Networks
WHITE PAPER: Attack surfaces, threat vectors and vulnerabilities are 3 widely researched topics when it comes to the internet of things (IoT). However, there isn't nearly enough research on the impact successful cyberattacks have on IoT devices. Unit 42, the global threat intelligence team at Palo Alto Networks, took a closer look at this impact.
Posted: 01 Apr 2021 | Published: 01 Apr 2021

TOPICS:  Security
Palo Alto Networks

Network Security Management For IT and industrial Networks
sponsored by Beta Systems
WHITE PAPER: Auconet Business Infrastructure Control Solution (BICS) for IT Security and its counterpart, BICS for Industrial Security, can help overcome key challenges of securing complex IT and industrial control networks. In this white paper, learn more about the security capabilities and features of Auconet BICS for IT and industrial control networks.
Posted: 04 Nov 2021 | Published: 10 Feb 2020

Beta Systems

Magic Quadrant for the CRM Customer Engagement Center
sponsored by ServiceNow
WHITE PAPER: Read this report for an overview of the CRM Customer Engagement Center market and details on why ServiceNow is a Leader in 2021 Magic Quadrant.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TOPICS:  IT Management
ServiceNow

The State Of Digital Transformation
sponsored by Pivotree
WHITE PAPER: In this report from Pivotree, they asked their customers what their digital transformation plans looked like for the next three to five years, as well as the challenges that stand in their way. Open up this report to find key insights from that research.
Posted: 17 Jun 2021 | Published: 17 Jun 2021

TOPICS:  IT Management
Pivotree

Things Every Solution Provider Should Consider When Evaluting New Vendors
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: MSPs face radically different security challenge, as recent attacks have highlighted. So how can you know that you're making the right security partner decisions? Download this short white paper to learn how MSPs can find a quality security partner, not just another vendor, with 5 key considerations.
Posted: 21 Jul 2021 | Published: 21 Jul 2021

WatchGuard Technologies, Inc.

Extreme File System Performance on Supermicro Servers
sponsored by Supermicro
WHITE PAPER: Check out this white paper to learn about Supermicro's next-gen X12 BigTwin hardware, featuring 3rd Generation Xeon® Scalable Processors supporting up to 40 cores, higher instructions per clock, and two 512-bit-FMA units.
Posted: 08 Sep 2021 | Published: 08 Sep 2021

TOPICS:  IT Management
All resources sponsored by Supermicro