Database Protection Reports

Computer Weekly – 26 March 2019: A 'stunning victory' in Post Office Horizon trial
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we report on the latest news from the court case about the controversial Post Office Horizon IT system. IT leaders share their views on creating a strategy for the digital age. And the CIO of Halfords talks about cloud, data analytics and emerging technologies. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Mar 2019

TechTarget ComputerWeekly.com

Presentation Transcript: Client-Side Security Issues - The Twilight Zone of Web Security
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript discusses the various types of JavaScript client-side issues that exist in today’s Web applications, their prevalence on the internet and how to locate and fix them.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

IBM

Download free DB2 10 Express-C software
sponsored by IBM
PRODUCT OVERVIEW: View this webpage to learn about the features of IBM DB2 for Linux, UNIX, and Windows, including autonomics, storage optimization, SQL compatibility, XML support, virtualization, developer support, and more.
Posted: 07 Jun 2012 | Published: 07 Jun 2012

IBM

Discover What’s New in Oracle Data Integrator and Oracle GoldenGate
sponsored by Oracle Corporation
WEBCAST: Join Oracle data integration experts as they discuss the new versions of Oracle Data Integrator and Oracle GoldenGate.
Posted: 18 Aug 2011 | Premiered: Aug 18, 2011

Oracle Corporation

Secure File Transfer Tech Guide
sponsored by TechTarget Security
EGUIDE: Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

TechTarget Security

Employing IBM Database Encryption Expert to meet encryption and access control requirements for the Payment Card Industry Data Security Standards (PCI DSS)
sponsored by IBM
WHITE PAPER: This white paper explores the challenges of compliance with PCI and how organizations must take a holistic approach to protecting and securing their business-critical information.
Posted: 27 Jul 2011 | Published: 27 Jul 2011

IBM

Presentation Transcript: Content Monitoring in the Enterprise
sponsored by Lumension
PRESENTATION TRANSCRIPT: This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Lumension

SearchSecurity.com E-Guide: Database Security Best Practices: Tuning database audit tools
sponsored by IBM
EGUIDE: Auditing is a key component to security and compliance, and a widely accepted practice by IT operations. In this expert tip, you’ll find an in-depth overview of the tools required to create and collect successful database audits, as well as a set of best practices for tuning audit tools.
Posted: 25 Aug 2011 | Published: 25 Aug 2011

IBM

Stopping application layer DDoS attacks: What you need to know
sponsored by TechTarget Security
EGUIDE: While a DDoS attack can be damaging to any organization, DDoS attacks specifically at the application-layer can be more ominous. Understanding these attacks are the first step to keeping your organization protected. In this e-guide, explore how DDoS is being used, what you can do to stop them, the future of the web threat landscape and more.
Posted: 27 Mar 2012 | Published: 27 Mar 2012

TechTarget Security

Building an Unstructured Data Protection Program
sponsored by STEALTHbits
EGUIDE: In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

STEALTHbits