Cross Site Scripting White Papers
-
Taking Action to Secure Web Applications
Sponsored by: TechTarget SecurityThis expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.
-
The Anatomy of a Cross-Site Scripting Campaign
Sponsored by: ImpervaXSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.
-
How to prevent cross-site scripting attacks: Expert tactics
Sponsored by: TechTarget SecurityThis expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks.
-
Protect Your Web Applications from the OWASP Top 10
Sponsored by: IBMApplications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
-
Your Personal Web Attack Survival Guide
Sponsored by: ImpervaThis white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
-
Protect People, Processes and Technology from Web Application Threats
Sponsored by: IBMSecuring externally facing applications is an important step toward safeguarding your critical assets. Find out why.
-
Web-Facing Applications: Mitigating Likely Web Application Threats
Sponsored by: TechTarget SecurityIn this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.
-
Computer Weekly – 26 March 2024: What are IT buyers spending their money on?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we reveal the technologies that IT buyers are spending their money on this year. The European CIO at PepsiCo explains how to make digital transformation go with a pop. And we look at the growing importance of cloud-to-cloud backup for data protection and resilience. Read the issue now.
-
Implementing GenAI: Use cases & challenges
Sponsored by: TechTarget ComputerWeekly.comThe use cases of generative AI are wide-ranging and have the potential to impact nearly all areas in business and IT. In this e-guide on generative AI, learn how to put the technology to work in business applications, DevOps and IT, as well as manage implementation challenges and risks.
-
CISO Success Stories: How security leaders are tackling evolving cyber threats
Sponsored by: TechTarget ComputerWeekly.comThe cyber threat landscape facing chief information security officers (CISOs) has morphed into a rapidly evolving beast, fuelled by the breakneck pace of digital transformation. In this e-guide, delve into the unique pressures faced by CISOs in technology and other industries, and how they are rising to the challenge.