XSS Reports

Taking Action to Secure Web Applications
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Web-Facing Applications: Mitigating Likely Web Application Threats
sponsored by SearchSecurity.com
EGUIDE: In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

SearchSecurity.com

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

How to prevent cross-site scripting attacks: Expert tactics
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks.
Posted: 21 Dec 2011 | Published: 21 Dec 2011

SearchSecurity.com

The Anatomy of a Cross-Site Scripting Campaign
sponsored by Imperva
WHITE PAPER: XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.
Posted: 23 Aug 2010 | Published: 23 Aug 2010

Imperva

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

2022 India Salary Survey - Future Work Infographic
sponsored by ComputerWeekly.com
INFOGRAPHIC: The results are in for the 2022 Career and Salary Survey. With over 800 respondents who work in the Indian IT sector, this infographic will give you a snapshot of what was the impact of the pandemic on IT staff, how working arrangements have changed and which topics have become a life priority for those working in tech.
Posted: 04 May 2022 | Published: 04 May 2022

ComputerWeekly.com

7 best practices for Web3 security risk mitigation
sponsored by ComputerWeekly.com
EGUIDE: Web3 is a fast-growing, but hotly debated, tech movement. Tech builders and businesses must take a proactive approach to security when evaluating Web3's potential. In this infographic, we point out seven best practices for Web3 risk mitigation to help leaders keep their network safe.
Posted: 10 Aug 2022 | Published: 10 Aug 2022

ComputerWeekly.com

APAC Media Consumption Survey 2022
sponsored by ComputerWeekly.com
LANDING PAGE: Information is a powerful tool for IT decision-makers, and we understand that our readers enjoy consuming media in many different ways. With this in mind, we are trying to gain a better understanding of what content types our readership values the most. By taking this survey, you will help us shape our content around your needs.
Posted: 19 May 2022 | Published: 19 May 2022

ComputerWeekly.com