IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed   
SQL Injection Reports
 
Infographic: 2019 Europe IT Priorities - Datacentre
sponsored by ComputerWeekly.com
EGUIDE: In this infographic, we take a look at what technological elements of the datacentre are expected to be the most important in 2019, the most popular datacentre projects and which technologies and services are being deployed. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.
Posted: 23 Apr 2019 | Published: 23 Apr 2019

ComputerWeekly.com

Automating Software Security Checks for Open Source Software and SDKs
sponsored by Data Theorem
WEBCAST: The growth of open source software (OSS) and 3rd-party software development kits (SDKs) have been on the rise over the last 5 years, and for good reason. But there are downsides. Learn about them in this webinar, which covers: Risks of using OSS and SDKs for apps, challenges of staying ahead of vulnerability issues in 3rd-party software, and more.
Posted: 11 Apr 2019 | Premiered: Apr 11, 2019

Data Theorem

Leading the Way With Secure Mobile Keyless Hotel Access
sponsored by Armor
CASE STUDY: According to the 2018 Verizon Data Breach Report, the hospitality industry is one of the top five industries subjected to network breaches every year. Learn how OpenKey, a company leading the way with secure mobile keyless hotel access, was able to securely host their customer data with a private cloud provider.
Posted: 07 May 2019 | Published: 07 May 2019

Armor

Secure Coding Best Practices Handbook
sponsored by Veracode, Inc.
WHITE PAPER: Access this whitepaper to learn some of the best steps you can take today to have more secure coding practices, and the many risks you'll be able to address.
Posted: 21 May 2019 | Published: 21 May 2019

Veracode, Inc.

How to Deal with Fraudulent Counterfeit Apps
sponsored by Data Theorem
WEBCAST: A counterfeit app is an unauthorized app that exploits the reach and user of a brand or mobile app for financial gain. In this webinar, learn about the different types of counterfeit apps and how to spot them.
Posted: 24 Jun 2019 | Premiered: Jun 24, 2019

Data Theorem

Top Research For CIOs: Security
sponsored by MASERGY
ANALYST REPORT: Security no longer lives exclusively in the IT department. In this Forrest report, CIOs can gain insight into the trends and key issues in the security landscape. Also, explore opportunities for improving how security is managed regardless of whether you own the security function.
Posted: 09 Aug 2019 | Published: 15 Mar 2019

MASERGY

Application Security Beyond Scanning
sponsored by Veracode, Inc.
WHITE PAPER: To make application security truly effective at reducing the risk of a damaging breach, there are three critical steps beyond scanning to help develop more secure code. Explore those three critical steps in this whitepaper.
Posted: 20 May 2019 | Published: 20 May 2019

Veracode, Inc.

Building Secure Software
sponsored by Trend Micro, Inc.
WEBCAST: Building securely doesn't just mean the code you are creating is high quality and doesn't have any obvious security vulnerabilities; it's more complicated than that. You have to account for that complexity when checking for vulnerabilities. In this webcast, listen as Mark Nunnikhoven of Trend Micro discusses how to build securely.
Posted: 03 Apr 2019 | Premiered: Apr 3, 2019

Trend Micro, Inc.

Build a Strategic Approach to Network and App Security
sponsored by Citrix
EBOOK: In this e-book, discover how an integrated, intelligent approach to security can help you deliver the access, control, and security you need.
Posted: 18 Jul 2019 | Published: 18 Jul 2019

Citrix

Arxan Threat Analytics
sponsored by Arxan
PRODUCT OVERVIEW: The need has never been greater to protect apps that drive the economy. Securing these business critical apps against exploits is key to preventing brand damage, financial loss, intellectual property theft and government penalties. In this solution brief, learn how Arxan provides app-level security to protect against a range of threats.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Arxan
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement