IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Cross Site Scripting

RSS Feed   
Cross Site Scripting Reports
 
Evaluating Client-side Web Security: Questions to Ask Your Vendor
sponsored by Tala Security
WHITE PAPER: When it comes to online interactions, protecting end-users from Magecart, XSS and other data theft attacks is critical to safeguarding both their sensitive data as well as brand reputation. This article offers 3 questions you should be asking your web security vendor – and why they matter.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Tala Security

Global Data at Risk: State of the Web Report
sponsored by Tala Security
WHITE PAPER: 2020 has indisputably been defined as a year of unique events with significant, long-lasting implications. The following report explores the state of the web in order to provide you with emerging trends, threat vectors, hacker behavioral patterns and more – read on to unlock the Global Data at Risk: 2020 State of the Web Report.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Tala Security

Web-Facing Applications: Mitigating Likely Web Application Threats
sponsored by SearchSecurity.com
EGUIDE: In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

SearchSecurity.com

Taking Action to Secure Web Applications
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

How to prevent cross-site scripting attacks: Expert tactics
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

SearchSecurity.com

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

The Anatomy of a Cross-Site Scripting Campaign
sponsored by Imperva
WHITE PAPER: XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Imperva

Webinar: Securing Your IT Infrastructure
sponsored by Vertiv
VIDEO: Safeguard your IT Infrastructure to allow remote employees to connect securely and to lower the security risk to the business. In this webinar, Vertiv experts will discuss how to avert security threats by preventing unauthorized out-of-band access to IT systems.
Posted: 29 Sep 2020 | Premiered: 29 Sep 2020

Vertiv
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info