IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed   
SQL Injection Reports
Get Started with Application Security in 3 Easy Steps
sponsored by Micro Focus
RESOURCE: With the growing demand for rapid delivery of new business applications, learn 3 steps that can help improve your organization's overall application security.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

Micro Focus

10 Steps to Lead You Through the System Integration Maze
sponsored by Magic Software Enterprises
WHITE PAPER: In this white paper discover 10 steps to help your organization navigate the system integration maze through systematic business process integration platforms that speed project completion, simplify integration, reduce risk and more.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Magic Software Enterprises

Trends in the Cost of Web Application & Denial of Service Attacks
sponsored by Akamai Technologies
RESOURCE: Ponemon Institute conducted a study to understand changes in the cost and consequences of web application and denial of service attacks. The report is divided into two sections. The first section addresses web application security and the second focuses on DoS attacks. Read this report to find key takeaways to help your organization.
Posted: 19 Dec 2018 | Published: 30 Jun 2018

Akamai Technologies

Mobile Endpoint Security
sponsored by Lookout
DATA SHEET: Download this white paper to learn about a comprehensive mobile endpoint security strategy that uses AI to close any potential security gaps – protecting your data at all levels.
Posted: 15 Jan 2019 | Published: 15 Jan 2019


Adobe Creative Cloud for enterprise security overview
sponsored by Adobe Inc
WHITE PAPER: Download this white paper to learn about the security features integrated into Adobe Creative Cloud, such as access control, encryption, identity management and much more.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Adobe Inc

When it Comes to Securing Your Open Source Components, WhiteSource Has You Fully Covered
sponsored by WhiteSource
WHITE PAPER: Open source components are the core building blocks of modern applications. However, development teams have been neglectful when it comes to ensuring that they meet basic security standards. In this white paper, learn about open source security challenges, the two pillars of open source security and why automation is king.
Posted: 08 Jan 2019 | Published: 08 Jan 2019


Vulnerability Review 2018: Top Desktop Apps
sponsored by Flexera Software
RESEARCH CONTENT: Download this 2018 report for key figures and facts on vulnerabilities affecting the most common desktop applications.
Posted: 06 Sep 2018 | Published: 30 Jun 2018

Flexera Software

Play it Safe, Secure Your Cloud Network Using These Methods
sponsored by Forcepoint
WEBCAST: Because there are no real standard practices yet, the risks presented by SaaS applications vary widely. Tune in to this webcast for the best practices to secure your cloud network.
Posted: 14 Sep 2018 | Premiered: Sep 14, 2018


The New NetOps: Securing App Delivery
sponsored by F5 Networks
WHITE PAPER: This white paper explores how transform your app delivery strategy to keep pace with the shift from waterfall to Agile, DevOps, and continuous integration/delivery methodologies. Find out how to update your ADC and learn about the BIG-IP Cloud edition, designed to help you build your NetOps program and enable secure app delivery.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

Moving Business-Critical Legacy Applications to Modern Operating Systems
sponsored by Numecent
CASE STUDY: Download this case study to see how the bank was able to utilize a tool for migrating applications and easing delivery, deployment and provisioning from the cloud – to ease their migration of business critical legacy applications, while maintaining sufficient levels of security.
Posted: 04 Sep 2018 | Published: 04 Sep 2018


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement