IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed   
SQL Injection White Papers (View All Report Types)
 
Enterprise Application Security Buying Guide
sponsored by Synopsys
WHITE PAPER: To ensure you have the technology necessary to build secure software, you'll want to put together a tool belt of solutions that address specific types of applications security weaknesses. Explore these 13 application security tools to learn what you should include as a part of your application security tool belt, and what to look for in each one.
Posted: 09 May 2019 | Published: 09 May 2019

Synopsys

Application Security Buyer's Guide
sponsored by Rapid7
WHITE PAPER: What characteristics should you look for in a Dynamic Application Security Testing (DAST) tool to give you greater accuracy and ease of use? Download this buyer's guide for 15 questions to ask yourself and your DAST vendor.
Posted: 04 Apr 2019 | Published: 04 Apr 2019

Rapid7

A Strategic Approach to Web Application Security
sponsored by WhiteHat Security
WHITE PAPER: App vulnerabilities originate with the source code, and you'll want to secure more of your source code in both development and production. But it's easier said than done for security pros to review source code continuously. Uncover a new static application security testing subscription service to address this problem.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

WhiteHat Security

Guide to the Proactive Security Paradigm: How Containers Can Revamp Your Approach to Security
sponsored by Twistlock, Inc.
WHITE PAPER: Discover how microservices and containers empower organizations to define a new, proactive security paradigm, and keep applications and the environments in which they live more secure than ever.
Posted: 07 Aug 2018 | Published: 07 Aug 2018


Preparing for the New OWASP Top 10 and Beyond
sponsored by F5 Networks
WHITE PAPER: Web app security is difficult and firewalls are not going to be enough. OSWAP has released a list of the 10 most common security concerns you need to address for your web apps. Access this e-book to learn about each of these 10 key web app security concerns and how you can mitigate them.
Posted: 16 Nov 2017 | Published: 31 Oct 2017

F5 Networks

European Businesses: You have a BYOD programme whether you like it or not
sponsored by Lookout
WHITE PAPER: 18% of federal employees with smartphones report encountering malicious software or malware. This white paper reveals how to secure your mobile devices from malware and protect your business as a whole from data loss.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Lookout

Cloud Visibility and Security for DevOps & SecOps Teams
sponsored by Ziften
WHITE PAPER: Moving a business-critical server or application to the cloud is not foolproof. System outages, data loss and more can, and do, occur due to misconfigurations, system failures, or security exploits. In this white paper, explore 6 common cloud visibility use cases encountered by DevOps and SecOps personnel on a regular basis.
Posted: 26 Mar 2019 | Published: 26 Mar 2019

Ziften

Software Today: What Applications Now Look Like
sponsored by Veracode, Inc.
WHITE PAPER: Download this infographic to see how modern applications are different today, and learn where you can take steps to prevent security risks throughout the development process.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Security for a Faster World
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett Packard Enterprise

Security Intelligence Is the Smart Way to Keep the Cloud Safe
sponsored by IBM
WHITE PAPER: Find out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
Posted: 08 Oct 2014 | Published: 31 Oct 2013

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement