Cross Site Scripting Research
-
Web-Facing Applications: Mitigating Likely Web Application Threats
Sponsored by: TechTarget SecurityIn this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.
-
Taking Action to Secure Web Applications
Sponsored by: TechTarget SecurityThis expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.
-
How to prevent cross-site scripting attacks: Expert tactics
Sponsored by: TechTarget SecurityThis expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks.
-
Protect Your Web Applications from the OWASP Top 10
Sponsored by: IBMApplications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
-
The Anatomy of a Cross-Site Scripting Campaign
Sponsored by: ImpervaXSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.
-
Your Personal Web Attack Survival Guide
Sponsored by: ImpervaThis white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
-
Protect People, Processes and Technology from Web Application Threats
Sponsored by: IBMSecuring externally facing applications is an important step toward safeguarding your critical assets. Find out why.
-
Computer Weekly – 13 February 2024: Intelligent defence – the role of data in the military
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the role of data in tying together military operations across ground, air, sea and cyber. Has SAP finally convinced customers to migrate to cloud ERP? We assess the trends. And we talk to the CIO helping to set up the UK's fastest supercomputer. Read the issue now.
-
Ten Ways to Replace Ineffective Meetings
Sponsored by: SlackHow your business can increase productivity and cut costs by swapping meetings with asynchronous work and task automation.
-
AI & Automation: Emerging Trends in the IT Industry Today
Sponsored by: SlackExplore how AI and automation are redefining work to enhance productivity and cut costs for IT teams.