SQL Injection Reports

How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020

Veracode, Inc.

How mobile remote desktop apps work
sponsored by LogMeIn Rescue Lens
EGUIDE: Mobile remote desktop apps can be an important tool for enterprises in keeping up with today's on-the-go workforce. The benefits of greater accessibility mean they could be a strategic fit in a variety of enterprise environments. Learn how to select the right mobile remote desktop products for your business, and how they work.
Posted: 13 Mar 2017 | Published: 10 Mar 2017

LogMeIn Rescue Lens

Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.
Posted: 19 Jul 2021 | Published: 20 Jul 2021

TechTarget ComputerWeekly.com

The Evolution of Network Security Hardware
sponsored by Aruba Networks
EGUIDE: This e-guide examines in detail how the basics of network security have changed since its inception. Learn about the 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months, and also how to make sure your Wi-Fi deployment is secure.
Posted: 01 Mar 2016 | Published: 24 Feb 2016

Aruba Networks

Mobile Security Risk Mitigation and Tips for Success
sponsored by Blue Cedar
EGUIDE: Mobile is the new norm, putting mobile app security into the spotlight. In this e-guide discover a different method of approaching mobile security by focusing on data over device, as well as 12 specific tips to conquer mobile security and common problems.
Posted: 13 Jul 2017 | Published: 11 Jul 2017

Blue Cedar

How to Increase Security for your Login on Mobile Applications
sponsored by IBM
EGUIDE: In this expert e-guide, learn techniques to improve security for your mobile login information and messaging applications to help stop unauthorized users from accessing your personal data.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

What You SIEM is What You Get
sponsored by AT&T Cybersecurity
WHITE PAPER: A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AT&T Cybersecurity

Is the Endpoint Security Nightmare Ending?
sponsored by TechTarget Security
EBOOK: In our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

TechTarget Security

Building a Strong Application Security Program
sponsored by Onapsis
EGUIDE: What are the first steps to creating a strong app security program, and how do you know you've struck the right balance between static and dynamic testing? These are the types of questions we explore in this e-guide. Find out what role education is playing in building an app security program and get advice for mitigating SAP vulnerabilities.
Posted: 12 Sep 2016 | Published: 09 Sep 2016

Onapsis

Information Security Magazine: October Issue
sponsored by TechTarget Security
EZINE: In this issue of Information Security magazine, we look at the shared responsibility model between organizations and service providers to protect data in the cloud.
Posted: 01 Oct 2015 | Published: 01 Oct 2015

TechTarget Security