IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

XSS

RSS Feed   
XSS White Papers (View All Report Types)
 
Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

The Anatomy of a Cross-Site Scripting Campaign
sponsored by Imperva
WHITE PAPER: XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Imperva

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Protecting Cloud Workloads from 2021’s Top Cloud Threat
sponsored by Radware
WHITE PAPER: Get an overview of the security challenges brought about by migrating computing workloads to public cloud environments and learn how Radware addresses those challenges and assists organizations in protecting themselves.
Posted: 07 Apr 2021 | Published: 07 Apr 2021

TOPICS:  Security
Radware

The CISOs Guide to Extending Zero Trust to the Endpoint
sponsored by Hysolate
WHITE PAPER: Zero trust is a holistic approach to network security, requiring the verification of each person and device whenever it attempts to access resources on a private network, regardless of whether they are already inside the perimeter. Open up this paper to explore everything you need to know about zero trust for your organization.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

TOPICS:  Security
Hysolate

2021 State of Open-Source Security Report
sponsored by Contrast Security
WHITE PAPER: Open-source libraries are growing in complexity, increasing risk while making it more difficult to secure modern applications. The 2021 State of Open-source Security Report uses telemetry from actual applications protected by Contrast OSS and Contrast Assess to reveal trends about library usage, vulnerabilities, and best practices. Read it here.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

TOPICS:  Security
Contrast Security

Top Challenges and Solutions for today’s technology leaders
sponsored by Magna5
WHITE PAPER: COVID-19 has accelerated the need for digital transformation and added more pressure onto today’s technology leaders to keep up. This paper covers 6 time-sensitive scenarios many organizations are facing, the challenges that may come with facing them, and the digital transformation solutions that can help. Download now to get started.
Posted: 16 Jun 2021 | Published: 16 Jun 2021

TOPICS:  IT Management
Magna5

Six Reasons IT Pros are Ditching Legacy Monitoring Tools
sponsored by LogicMonitor
WHITE PAPER: Today’s organizations are shifting their IT assets to the cloud, which has caused IT pros to ditch their legacy monitoring tools in favor of SaaS-based monitoring options. Access this white paper to discover 6 reasons why IT pros are making the switch from reactive monitoring to real-time observability.
Posted: 18 Jun 2021 | Published: 18 Jun 2021

TOPICS:  IT Management
LogicMonitor

Ransomware and the Cost of Downtime
sponsored by Datto, Inc.
WHITE PAPER: According to a recent study, in the first half of 2020 ransomware attacks grew by 715% as cybercriminals began exploiting the pandemic. Take a deep dive into this infographic to learn more about ransomware attacks, the true cost of downtime, and how a business continuity and disaster recovery (BCDR) platform can help protect your clients.
Posted: 13 May 2021 | Published: 13 May 2021

TOPICS:  Security
Datto, Inc.
 
Browse by Report Type:
XSS White Papers | XSS Multimedia | XSS IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences