IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed   
SQL Injection Reports
 
Vulnerability Review 2018: Top Desktop Apps
sponsored by Flexera Software
RESEARCH CONTENT: Download this 2018 report for key figures and facts on vulnerabilities affecting the most common desktop applications.
Posted: 06 Sep 2018 | Published: 30 Jun 2018

Flexera Software

Closing Your App Gap with Business Dashboards and Analytics
sponsored by IBM
WHITE PAPER: Download this article to learn how a unified endpoint management platform utilizes AI/cognitive technology to provide specialized views on app usage, performance and security.
Posted: 26 Jun 2018 | Published: 26 Jun 2018

IBM

5 Techniques to Protect Against a SQL Injection Attack
sponsored by Alert Logic
EBOOK: SQL Injection, the hacking technique that has caused havoc since first being identified in 1998, is still being used on a regular basis. Download this e-book for 5 preventive techniques to get ahead of cybercriminals and secure your SQL-based apps from injections, today.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Alert Logic

The State of Application Development: How IT Is Responding to Digital Disruption and Innovation
sponsored by OutSystems
WHITE PAPER: Download this report for a look into the state of application development and learn how your organization can overcome some of the biggest challenges to application development today.
Posted: 25 Jun 2018 | Published: 18 Jun 2018

OutSystems

Securing Web Applications
sponsored by Oracle Dyn
EBOOK: Attacks on web applications can circumvent your security and harm your business in myriad ways by creating unwanted downtime, reducing availability and responsiveness, and shattering trust with your customers when data confidentiality and integrity is compromised.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Oracle Dyn

Dark Bot Survival Guide: Strategies for Understanding the evolving Web Security Threat Landscape
sponsored by Oracle Dyn
WHITE PAPER: Bot technology is becoming increasingly sophisticated and bot traffic right now makes up more than 50% of all Internet traffic – more than human. Access this survival guide to gain strategies for better understanding the evolving web security threat landscape.
Posted: 07 Jun 2018 | Published: 07 Jun 2018

Oracle Dyn

Streamline Network Management, Monitoring, and Security: Demo
sponsored by Cato Networks
VIDEO: Watch this brief demo of a network security platform that's designed to help you simplify network monitoring and drive visibility into the apps, users, and devices on your network.
Posted: 06 Jun 2018 | Premiered: 30 Mar 2017

Cato Networks

Controlling the Uncontrollable End User
sponsored by Citrix
RESOURCE CENTER: Read this article to learn how secure digital workspaces can provide platforms that position your organization to give users the experience and options they demand, while providing unified security and management functionality for IT.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

Citrix

Application security: More important than ever
sponsored by IBM
EGUIDE: In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

IBM

Build vs Buy: Dynamic Authorization Solutions
sponsored by Axiomatics
WHITE PAPER: Download this review, for an assessment of the technological, price point, time-to-market, and ongoing maintenance and enhancement advantages of utilizing a dedicated security partner versus attempting to replicate a secure, scalable, and comprehensive solution in-house.
Posted: 12 Jun 2018 | Published: 12 Jun 2018

Axiomatics
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement