IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed   
SQL Injection White Papers (View All Report Types)
 
Keeping Your Application Fleet Flying Risk Free
sponsored by Flexera Software
WHITE PAPER: Just like sending an airplane out for take-off without any preemptive maintenance checks, deploying applications without vulnerability scans poses a major risk for your organization. Download this whitepaper to learn how your organization can mitigate application risks and stay secure.
Posted: 06 Sep 2018 | Published: 06 Sep 2018

TOPICS: 
Flexera Software

Discover Static Applications Security Testing for Microservices
sponsored by WhiteHat Security
WHITE PAPER: In the race to get to market, the last thing you want is to overlook the security of your microservices architecture. Don't leave your development process vulnerable. Click inside to learn about a Static Applications Security Testing (SAST) offering that allows you to ensure your microservices are as safe as possible.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

TOPICS: 
WhiteHat Security

Everything You Need to Know About Getting Application Security Buy-in
sponsored by Veracode, Inc.
WHITE PAPER: Application security impacts multiple groups across the entire organization. Read this paper to learn everything you need to know about getting these groups to buy-in on application security.
Posted: 02 Aug 2018 | Published: 02 Feb 2018

TOPICS: 
Veracode, Inc.

Operating Kubernetes Clusters and Applications Safely
sponsored by Aqua Security
WHITE PAPER: Keep your organization free of container and Kubernetes threats before they're able to hit you. Download this 85-page whitepaper on container and Kubernetes security to learn what changes you can make today to keep your data safe.
Posted: 17 Jan 2019 | Published: 31 Oct 2018

TOPICS: 
Aqua Security

Don't Invite Bad Code In
sponsored by Veracode, Inc.
WHITE PAPER: Download this white paper to discover a software composition analysis technology that checks your third-party code at the same time you're scanning your own code, giving you complete visibility into your applications' security, in a single report.
Posted: 02 May 2018 | Published: 02 May 2018

TOPICS: 
Veracode, Inc.

Why Moats and Castles Belong in the Past
sponsored by Akamai Technologies
WHITE PAPER: The moats and castle approach to enterprise security no longer works. Once inside the walls, a person can pretty much do whatever they want. Discover a new way that is simpler, more secure, and a convenient way to protect your enterprise.
Posted: 18 Jun 2018 | Published: 31 May 2017

TOPICS: 
Akamai Technologies

Guide to the Proactive Security Paradigm: How Containers Can Revamp Your Approach to Security
sponsored by Twistlock, Inc.
WHITE PAPER: Discover how microservices and containers empower organizations to define a new, proactive security paradigm, and keep applications and the environments in which they live more secure than ever.
Posted: 07 Aug 2018 | Published: 07 Aug 2018

TOPICS: 

How desktop and app virtualization affects IT security
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them.
Posted: 22 May 2014 | Published: 22 May 2014

TOPICS: 
Citrix

Firewall Buyer's Guide
sponsored by Palo Alto Networks
WHITE PAPER: Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

TOPICS: 
Palo Alto Networks

Software Today: What Applications Now Look Like
sponsored by Veracode, Inc.
WHITE PAPER: Download this infographic to see how modern applications are different today, and learn where you can take steps to prevent security risks throughout the development process.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

TOPICS: 
Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement