IT Management  >   Systems Operations  >   Security  >  

SQL Injection

RSS Feed   
SQL Injection Reports
 
Who’s Stalking Mobile App Users?
sponsored by The Media Trust
WHITE PAPER: It’s difficult to disagree with the convenience of mobile applications, but have you ever considered the data being captured? Consumer awareness and regulations like GDPR & CCPA are creating a dramatic shift in app development and experience. In this report, find hidden vulnerabilities, the role of cookies & other findings.
Posted: 01 Nov 2019 | Published: 31 Oct 2019

The Media Trust

Preventing Unknown, Zero-Day Attacks
sponsored by Checkpoint Software Technologies
DATA SHEET: The increasing reliance of mobile devices to conduct business operations organizations vulnerable to hackers who would look to expose these weaknesses. In this solution brief, learn more about the benefits and features of Check Point SandBlast Mobile and discover how it compares to similar industry offerings.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Checkpoint Software Technologies

How Relationships Power Application Security in the Cloud
sponsored by vArmour
RESOURCE: In order to effectively establish cloud security across a disparate set of application, it’s necessary to understand how these applications interact & who is responsible for their security. In this technical brief, take a closer look at the shared security model for tracking risks.
Posted: 29 Jan 2020 | Published: 29 Jan 2020


Achieving PCI Compliance with Alcide Kubernetes Security
sponsored by Alcide
WHITE PAPER: Download this white paper to learn how Alcide’s software solutions can help organizations combat the challenges of PCI compliance in a cloud native era.
Posted: 03 Mar 2020 | Published: 03 Mar 2020

Alcide

State of the Internet: Financial Services Attack Economy
sponsored by Akamai Technologies
WHITE PAPER: The financial service industry faces a wide area of cybersecurity threats, including password problems, phishing, mobile application attacks, and more. Being aware of the most current attack trends can be critical for the security of sensitive data. This research report breaks down the specific challenges and threats within the industry.
Posted: 27 Dec 2019 | Published: 31 Jul 2019

Akamai Technologies

Protect Critical SAP Transactions and Address Business Risks
sponsored by Appsian
DATA SHEET: Learn how to effectively address the risks associated with ERP business transitions using Appsian Security Platform.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Appsian

What’s Wrong With DAST
sponsored by Wallarm
WHITE PAPER: Most security organizations use vulnerability scanners and other DAST tools. However, most of the scanners that are deployed today are limited in their coverage. In this white paper, learn about 3 important areas a scanner must address when conducting scans to ensure full coverage.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

Wallarm

State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: Download this 57-page e-book which covers the entire state of software security with data covering identifying new trends, the biggest security questions to address, and 3 key takeaways.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

Veracode, Inc.

Cloud Application Security & Performance: Critical Considerations for SaaS Providers
sponsored by Cloudflare
EBOOK: Users today want faster, more personalized interactions when they use a SaaS app. It’s possible to build such experiences if you use the right tools. Download this white paper to learn what Cloudflare has to offer.
Posted: 07 Oct 2019 | Published: 07 Oct 2019

Cloudflare

Assess Secure Web Gateways to Suit Your Network Security Needs
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: Secure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info