SQL Injection White Papers

(View All Report Types)
How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020

Veracode, Inc.

PERIMETER SECURITY NOISE LEAVES APPLICATIONS VULNERABLE TO ATTACKS
sponsored by Contrast Security
WHITE PAPER: Learn how you can get AppSec protection that can compensate with the necessary visibility, accuracy, scalability, and ease of deployment to keep pace with modern application vulnerabilities without generating false positives and false negatives.
Posted: 08 Feb 2021 | Published: 08 Apr 2020

Contrast Security

Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Access this informative white paper to discover suggestions for a number of initiatives related to enterprise mobility, including mobility management and application access.
Posted: 25 Aug 2014 | Published: 30 May 2014

Hewlett-Packard Enterprise

Firewall Buyer's Guide
sponsored by Palo Alto Networks
WHITE PAPER: Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Palo Alto Networks

AppConnect and AppTunnel: Advanced Security for Mobile Apps
sponsored by MobileIron
WHITE PAPER: This exclusive resource discusses a security solution that prevents data loss as mobile applications become business-critical and widespread tools in the enterprise.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

MobileIron

The Use Case for Integrated Vulnerability Management CORE Security
sponsored by Core Security Technologies
WHITE PAPER: This white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.
Posted: 10 Oct 2013 | Published: 10 Oct 2013

Core Security Technologies

Securing Enterprise Data in a BYOD World
sponsored by Globo
WHITE PAPER: Bring-your-own-device (BYOD) initiatives can increase productivity and make for happier employees, but they pose serious security risks. This resource outlines the fundamentals of mobile security that so often go overlooked. Read on to get advice on how to leverage a security strategy to make your enterprise mobilization effective and safe.
Posted: 06 Jun 2013 | Published: 06 Jun 2013

Globo

Improve Your Mobile Application Security
sponsored by IBM
WHITE PAPER: Mobile applications bring with them a whole slew of security concerns that must be addressed throughout the development and deployment process. This helpful white paper introduces a mobile application development platform that helps you tackle security issues on devices, over the network, in the enterprise, and within the application itself.
Posted: 06 May 2014 | Published: 31 Oct 2012

IBM

Mobilizing Windows Apps
sponsored by Citrix
WHITE PAPER: This white paper provides best practices for implementing secure remote access to Windows apps and data from any device. Read on now to learn more.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Citrix

Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks
sponsored by Palo Alto Networks
WHITE PAPER: In this valuable resource, discover a security platform designed to keep up with today's ever-evolving threat landscape, which offers optimum network security without lowering network performance or reducing business productivity.
Posted: 26 Dec 2013 | Published: 31 Aug 2013

Palo Alto Networks