IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed   
SQL Injection Reports
 
WhiteHat Pen Test Service
sponsored by WhiteHat Security
DATA SHEET: In this guide, learn how to maximize your application security with automated and continuous web application scanning plus periodic pen testing to find and fix crucial vulnerabilities faster. This advanced approach will significantly reduce the risk of data breaches and other cybersecurity incidents. Get the details first-hand here.
Posted: 13 Nov 2020 | Published: 13 Nov 2020

WhiteHat Security

CONTRAST OSS HELPS DEVOPS MANAGE AND TRIAGE HIDDEN OSS LIBRARY RISK
sponsored by Contrast Security
EBOOK: Download this eBook to learn about a new approach to OSS security: Contrast OSS, and how it can help you prioritize critical vulnerabilities by tracking the libraries that actually get used during runtime operation.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Contrast Security

Protecting On-Premises Microsoft Exchange Servers
sponsored by TransientX, Inc
WHITE PAPER: On March 3, 2021 the US Government issued a directive to mitigate vulnerabilities with on-premises Microsoft Exchange servers due to a hack by a state-sponsored group Microsoft calls Hafnium. This day taught the lesson that VPN alone would not protect servers and data. Open this white paper to learn why zero trust can.
Posted: 02 Apr 2021 | Published: 02 Apr 2021


The Advantages of a SaaS-Based Application Security Solution
sponsored by Veracode, Inc.
RESOURCE: In this infographic, discover 7 advantages of a SaaS-based application security program vs. on-premises.
Posted: 07 May 2020 | Published: 07 May 2020

Veracode, Inc.

Tips to Follow onYour AppSec Journey
sponsored by Veracode, Inc.
RESOURCE: Best practices don’t become best practices overnight. There are first steps to take for each, not least in application security. So for processes such as testing, shifting left and vulnerability management, how can you start? Access this infographic to learn 5 AppSec best practices and 5 practical first steps to each.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

Veracode, Inc.

How To Integrate Security In Your DevOps Environment
sponsored by F5 Networks
EGUIDE: Application security has two challenges: Keeping pace with the evolution and sophistication of attacks, and keeping pace with the speed of modern application development...DevOps.
Posted: 29 Apr 2020 | Published: 28 Apr 2020

F5 Networks

SIG - SASE For Dummies
sponsored by Cisco Umbrella
EBOOK: Secure access service edge (SASE) delivers networking and security via the cloud, giving organizations the ability to securely enable remote users, devices and SaaS apps without inhibiting performance. Read ‘SASE for dummies’ to get a closer look at this technology and learn the key components of a SASE solution.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Cisco Umbrella

Bridge your Executive Team
sponsored by WhiteHat Security
WEBCAST: Application security is becoming increasingly important as applications play a more prominent role in driving today’s economy. Watch this webinar to learn more about the current state of AppSec, the challenges security teams are facing and how to get executive buy-in for AppSec initiatives.
Posted: 16 Dec 2020 | Premiered: Dec 16, 2020

WhiteHat Security

SIG - Have you outgrown your traditional secure web gateway?
sponsored by Cisco Umbrella
EBOOK: Secure web gateways (SWGs) are deployed at most organizations – however, a vast majority of users (>90%) are unsatisfied with their current SWG solution. This e-book provides a closer look at the shortcomings of traditional SWG tools and explores the features and capabilities of Cisco’s modern, cloud-based SWG – read on to learn more.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Cisco Umbrella

API Security 101: Your Expert Guide to API Defense
sponsored by TechTarget
RESOURCE: As organizations take measures against common vulnerabilities, hackers have set their sights on a new target: APIs. This e-guide shines a light on API risks and vulnerabilities, as well as the tactics forward-thinking businesses can use to stay secure.
Posted: 01 Apr 2021 | Published: 02 Apr 2021

TechTarget
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences