IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed   
SQL Injection Reports
 
A New Approach to Secure Mobile Banking Apps
sponsored by Arxan
WHITE PAPER: Customer demand has pushed for standardized mobile banking, which means financial institutions are required to properly handle the heightened security requirements that come with it. Read this whitepaper to learn the 3 transformational benefits of a well-designed endpoint security strategy for mobile banking applications.
Posted: 22 Jul 2019 | Published: 31 Dec 2018

Arxan

2019 State of DevOps Report
sponsored by Puppet
EBOOK: While security is often one of the most dreaded or ignored aspects of product development, it ironically has become one of the biggest proponents to successful development lifecycles. Download your copy of this development lifecycle report which includes finds on the state of DevOps, security best practices, and more.
Posted: 07 Oct 2019 | Published: 07 Oct 2019

Puppet

Automated Security at the Speed of DevOps
sponsored by Trend Micro, Inc.
WHITE PAPER: As organizations implement DevOps on AWS, they need to understand the security implications. In this white paper, explore the main challenges businesses face at the intersection of DevOps and security. Also, learn best practices for integrating security within your development process from the start.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Trend Micro, Inc.

Debunking No-code and Low-code Adoption Myths
sponsored by Crowd Machine
RESOURCE: The following post will set the record straight and debunk the three most common myths about no-code and low-code platforms. Read it here to separate fact from fiction and to get an objective take on what these platforms are capable of.
Posted: 12 Aug 2019 | Published: 03 May 2019

Crowd Machine

The 4 Types of Threat Detection
sponsored by Dragos
WHITE PAPER: Threat detection comprises 1 of the 3 core cybersecurity functions along with prevention and response. But, detection plays an outsized role as arguably the most important cybersecurity function in an "assume breach" world. In this white paper, explore the 4 types of threat detection, how they are derived and the uses for each.
Posted: 01 Aug 2019 | Published: 13 Jul 2018

Dragos

Application Security Beyond Scanning
sponsored by Veracode, Inc.
WHITE PAPER: To make app security truly effective, there are 3 critical steps you must take beyond scanning to develop more secure code. Download this white paper to learn those 3 steps and how you can get started implementing them today.
Posted: 25 Sep 2019 | Published: 25 Sep 2019

Veracode, Inc.

Top Research For CIOs: Security
sponsored by MASERGY
ANALYST REPORT: Security no longer lives exclusively in the IT department. In this Forrest report, CIOs can gain insight into the trends and key issues in the security landscape. Also, explore opportunities for improving how security is managed regardless of whether you own the security function.
Posted: 09 Aug 2019 | Published: 15 Mar 2019

MASERGY

Secure Your Business-Critical Applications
sponsored by Onapsis
PRODUCT OVERVIEW: An attack on your SAP and Oracle EBS applications would have a devastating impact on your organization's financial well-being and reputation, yet security remains a blind spot. In this solution brief, learn how Secure the Core by Onapsis protects your ERP systems from internal and external threats.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Onapsis

The Continuous Application Security Handbook
sponsored by Contrast Security
EBOOK: With widespread enterprise reliance on automated software and applications, security has become a concern that haunts just about every tech-driven business. Download this handbook for a look into continuous application security, and how to establish the three key layers of security within your own applications.
Posted: 25 Jul 2019 | Published: 31 Dec 2017

Contrast Security

2019 Cyberthreat Defense Report
sponsored by Gigamon
ANALYST REPORT: In this 2019 Cyberthreat Defense Report, learn about the latest trends for the frequency & impact of cyberattacks, the adequacy of organizational security postures, the greatest barriers to establishing strong defenses, and more.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

Gigamon
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement