IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed   
SQL Injection Reports
 
Dynamic Analysis in a DevSecOps World
sponsored by Veracode, Inc.
WHITE PAPER: Prioritizing security during development can become a hassle when trying to ensure an application delivers on operational functionality. Download this DevSecOps guide on dynamic testing and analysis benefits, and see how it can boost encapsulation from 22% to 39%.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Veracode, Inc.

How to Deal with Fraudulent Counterfeit Apps
sponsored by Data Theorem
WEBCAST: A counterfeit app is an unauthorized app that exploits the reach and user of a brand or mobile app for financial gain. In this webinar, learn about the different types of counterfeit apps and how to spot them.
Posted: 24 Jun 2019 | Premiered: Jun 24, 2019

Data Theorem

2019–2020 Global Application & Network Security Report
sponsored by Radware
ANALYST REPORT: To provide insight into the complex challenges faced by organizations as they seek to balance business agility and security requirements, Radware produced a Global Application & Network Security Report. Download the report to explore real attack data, analyses of developing trends and technologies, and findings from a global industry survey.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Radware

Buyer’s Guide for Certificate Lifecycle Automation
sponsored by AppViewX
WHITE PAPER: The number of certificates in your infrastructure is growing with no signs of slowing down. An expiry or certificate-related issue will not only cause an application outage but could also cripple your trust-based systems. In this white paper, uncover a checklist to help you re-evaluate your current certificate management methods.
Posted: 31 Oct 2019 | Published: 31 Oct 2019

AppViewX

How to choose the right micro-segmentation provider
sponsored by Guardicore
WHITE PAPER: As micro-segmentation grows in popularity, there are a number of options to choose from for security operations, from the vendors themselves to the tools and processes they offer. Download this white paper to explore the essential elements to consider before choosing a micro-segmentation provider today.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

Guardicore

Closing the Website Security Gap: Why a WAF Is Not Enough
sponsored by Tala Security
WHITE PAPER: Although web application firewalls (WAFs) have a come a long way in recent years, they remain ineffective as a standalone security solution against Magecart cyberattacks. This white paper underlines the shortcomings of WAFs and highlights the importance of protecting the browser-side and the client-side from threats.
Posted: 15 Jan 2020 | Published: 15 Jan 2020

Tala Security

Infographic: How blockchain works
sponsored by ComputerWeekly.com
EGUIDE: To get a solid understanding of how to use blockchain in an enterprise setting, CIOs must first grasp how a unit of value in a transaction moves from party A to party B. This infographic details how blockchain works from transaction initiation, through verification, all the way to delivery.
Posted: 17 Sep 2019 | Published: 17 Sep 2019

ComputerWeekly.com

Secure Cloud Transformation
sponsored by Menlo Security
WHITE PAPER: As a result of the increasing popularity of SaaS tools and applications, organizations are rethinking their infrastructure to include security without sacrificing user experience. In this white paper, take an in-depth look into strategic principles IT leaders are incorporating, and explore Menlo Security’s Cloud Platform.
Posted: 02 Dec 2019 | Published: 02 Dec 2019

Menlo Security

Building a Business Case for Expanding Your Appsec Program
sponsored by Veracode, Inc.
WHITE PAPER: Code vulnerabilities and cyber threats are affecting absolutely everyone, and there is no longer any reason for security to be an afterthought in the application development process. Jump into this guide to learn how to build your case for a shift left in application security.
Posted: 25 Sep 2019 | Published: 25 Sep 2019

Veracode, Inc.

Safeguarding PeopleSoft Against Direct Deposit Theft
sponsored by Appsian
WHITE PAPER: In this white paper, explore security challenges associated with handling payroll diversion in PeopleSoft. Also, learn how user awareness, contextual access controls, and fine-grained data security can help organizations mitigate payroll diversion.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Appsian
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info