IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed   
SQL Injection Reports
 
Keeping Your Application Fleet Flying Risk Free
sponsored by Flexera Software
WHITE PAPER: Just like sending an airplane out for take-off without any preemptive maintenance checks, deploying applications without vulnerability scans poses a major risk for your organization. Download this whitepaper to learn how your organization can mitigate application risks and stay secure.
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Flexera Software

The State of Application Development: How IT Is Responding to Digital Disruption and Innovation
sponsored by OutSystems
WHITE PAPER: Download this report for a look into the state of application development and learn how your organization can overcome some of the biggest challenges to application development today.
Posted: 25 Jun 2018 | Published: 18 Jun 2018

OutSystems

Vulnerability Review 2018: Top Desktop Apps
sponsored by Flexera Software
RESEARCH CONTENT: Download this 2018 report for key figures and facts on vulnerabilities affecting the most common desktop applications.
Posted: 06 Sep 2018 | Published: 30 Jun 2018

Flexera Software

AdminStudio Application Virtualization
sponsored by Flexera Software
WEBCAST: Watch this quick video to learn how Flexera AdminStudio arms your IT team with a complete application readiness tool. So you can identify and mitigate issues before pulling the deploy trigger.
Posted: 05 Sep 2018 | Premiered: Jul 27, 2018

Flexera Software

How Cloudera Keeps its Machine Learning and Analytics Platform Secure
sponsored by Cisco Umbrella
CASE STUDY: In this case study, learn how a growing a US-based software company was able to safeguard its data across all of its cloud-based applications using a Cloud Access Security Broker (CASB).
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Cisco Umbrella

Kubernetes Security Guide
sponsored by Sysdig
ESSENTIAL GUIDE: Container security is top-of-mind for any organization adopting Kubernetes. This eBook is designed to provide you with the best practices for implementing Kubernetes security in your organization. Read on to find out more.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Sysdig

Is Your WAF Keeping Pace With Today's Threats?
sponsored by F5 Networks
WHITE PAPER: Cyberattackers are starting to target the application layer, which if breached allows attackers to access the interfaces that hosts use to communicate and access information sent over a network. Read this white paper to learn how to choose a web app firewall (WAF) that protects your network.
Posted: 26 Sep 2018 | Published: 26 Sep 2018

F5 Networks

You Can't Fight Today's DoS Attacks With Yesterday's WAF
sponsored by F5 Networks
RESOURCE: Traditional WAFs have prevented numerous application attacks by applying protocol compliance and signature comparisons to filter and block potential attacks. However, these WAFs are ill-equipped to keep up with more advanced attacks. Read on to learn how you can replace your traditional WAF with an advanced WAF, today.
Posted: 26 Sep 2018 | Published: 26 Sep 2018

F5 Networks

Application & Infrastructure Security Controls on the Kinvey Platform
sponsored by Progress Software, Inc.
WHITE PAPER: This white paper describes the security features of a mobile Backend as a Service (mBaaS) platform to help alleviate these security and privacy risks by isolating and protecting enterprise data sources and networks from client applications running on untrusted devices and their networks.
Posted: 29 Jun 2018 | Published: 29 Jun 2018

Progress Software, Inc.

Play it Safe, Secure Your Cloud Network Using These Methods
sponsored by Forcepoint
WEBCAST: Because there are no real standard practices yet, the risks presented by SaaS applications vary widely. Tune in to this webcast for the best practices to secure your cloud network.
Posted: 14 Sep 2018 | Premiered: Sep 14, 2018

Forcepoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement