IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed   
SQL Injection Reports
 
SIG - SASE For Dummies
sponsored by Cisco
EBOOK: Today’s IT teams must securely enable roaming users, devices, and SaaS apps without adding complexity or reducing performance. Likewise, they must develop strategies to protect users from a variety of evolving threats. Read this e-book to examine the changing network and security landscape and steps you can take to keep your organization secure.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Cisco

API Security & the OWASP API Top 10
sponsored by Traceable
VIDEO: The OWASP API Top 10 project set out with a clear goal – to identify and provide insight into the most detrimental API vulnerabilities that exist across today’s organizations. Watch this episode of The API Security & the OWASP API Top 10 webinar series for a deep dive into 4 of the 10 critical API threats.
Posted: 17 Feb 2021 | Premiered: 03 Jan 2021

Traceable

CONTRAST OSS HELPS DEVOPS MANAGE AND TRIAGE HIDDEN OSS LIBRARY RISK
sponsored by Contrast Security
EBOOK: Download this eBook to learn about a new approach to OSS security: Contrast OSS, and how it can help you prioritize critical vulnerabilities by tracking the libraries that actually get used during runtime operation.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Contrast Security

The State of Application Security
sponsored by WhiteHat Security
WEBCAST: Attackers continue to take advantage of application flaws to compromise organizations and put their customers at risk. This means that as much as Dev teams prioritize faster release cycles, it’s important that they don’t overlook security. In this WhiteHat webinar, examine the state of application security and what you can do to stay protected.
Posted: 09 Dec 2020 | Premiered: Dec 9, 2020

WhiteHat Security

RiskScore Index Report
sponsored by Contrast Security
WHITE PAPER: Read this Report to learn about the Contrast Risk Score algorithm, its initial use on different vulnerability types and how to get involved when it is released as an open-source project.
Posted: 13 Apr 2021 | Published: 13 Apr 2021

Contrast Security

Protecting APIs and Securing Applications So Business Can Thrive
sponsored by Radware
RESEARCH CONTENT: Nearly every organization relies on applications to connect with customers, business partners, suppliers and staff. As a result, the application and API threat landscape has evolved dramatically. Read this research report for a closer look at the state of application and API security, including top threats, best practices and more.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Radware

Auth0 Platform Introduction
sponsored by Auth0
WEBCAST: This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.
Posted: 02 Jul 2020 | Premiered: Jul 2, 2020

Auth0

Application Fraud: Accelerating Attacks and Compelling Investment Opportunities
sponsored by IDology
RESEARCH CONTENT: Application fraud has consistently been reported to be among the top biggest pain points for fraud executives in the financial industry with evidence that it's gotten significantly worse. That's why this Aite Impact report, in collaboration with IDology, delves into how FIs are managing this challenge today.
Posted: 04 Jun 2021 | Published: 04 Jun 2021

IDology

Tips to Follow onYour AppSec Journey
sponsored by Veracode, Inc.
RESOURCE: Best practices don’t become best practices overnight. There are first steps to take for each, not least in application security. So for processes such as testing, shifting left and vulnerability management, how can you start? Access this infographic to learn 5 AppSec best practices and 5 practical first steps to each.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

Veracode, Inc.

The Roi Of The Zeronorth®App Sec Automation & Orchestration Platform
sponsored by ZeroNorth
WHITE PAPER: Today, DevOps presents an opportunity to flip the script on AppSec investments. Organizations can finally see past the myth of AppSec as a never-ending cost center by automating and orchestrating AppSec tools with development pipelines. See how AppSec automation and orchestration can fit into your DevOps strategy here.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

ZeroNorth
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences