About UBM Tech's
Sponsored Content Program
UBM Tech -- parent to the tech industry's most popular editorial brands such as InformationWeek, Dark Reading, Dr. Dobbs, Network Computing, and BYTE -- offers advertisers, sponsors, and partners, many different tools for targeting specific audiences with messages about their products and services. For example, our targeted advertising (ie: "banner ads"), whitepapers, webcasts, and virtual events, have all proven to be very successful vehicles in helping providers of technology products and services, to achieve their messaging objectives.
In 2011, UBM Tech added a Sponsored Content Program to the set of tools that its partners can draw upon in an effort to get their messages across to information technology professionals.
On a daily basis, our editors receive more third party article submissions than they can count. However, as a matter of policy, the various UBM Tech sites usually turn down such submissions, on the grounds that they could potentially interfere with our editorial neutrality and objectivity. In the case of whitepapers and other forms of content that can be found on our sites and that may have been authored by UBM Tech's sponsors and advertisers, the sources of those assets and documents are clearly disclosed so as not to confuse them with the content that's fairly and objectively authored by our editors and writers.
Largely adhering to the same rules of disclosure, our Sponsored Content Program offers UBM Tech's partners a means for publishing third party-authored articles to our sites. In order for such submissions to be published, the sources of those submissions must be clearly displayed, along with a link to this statement, and a disclosure that the content does not represent the opinions or views of UBM Tech or its editors. Disclosures are also made wherever the third party content is being promoted as well. For example, wherever a list of such submissions might appear near our editorial content. Finally, that content cannot be promoted using the same automated listings or feeds that are used to promote our editorial content. For example, in a listing of news stories or in an RSS feed.
For more information on how to participate in UBM Tech's Sponsored Content program, please write to SponsoredContent@TechWeb.com or visit and complete the Contact Me form on CreateYourNextCustomer.com.
Free Research and Reports
- Dell Software Foglight APM 5.9: Introducing Big Data Repository/Reporting Supporting Web Analytics and User-Centric APM
- How Foglight Makes User Experience Management A Reality: Three Case Studies
- Application Performance Monitoring (APM) in the Age of Hybrid Cloud: Ten Key Findings by EMA
- Controlling and Managing Superuser Access
- 10 Steps to Cleaning up Active Directory
- Keynote Interview: CIO Randy Mott On GM's Unprecedented IT Transformation: Lessons Learned - InformationWeek Conference
- The Digital Disruptors - InformationWeek Conference
- Keynote Speaker: Michelle McKenna-Doyle, CIO, NFL - InformationWeek Conference
- Crash Course in Open Source Cloud Computing - Interop Las Vegas
- No CIO Ever Got Promoted For… - Interop Las Vegas
Dark Reading Digital Magazine
Quick Wins For Strengthening SMB Security
Time To Set Up That Honeypot
Securing Cisco IP Telephony
Attribution Is Much More Than A Source IP
New CA Group Has Big Names, Small Impact
How To Build An IT Security Budget
5 Approaches To Decaffeinating Java Exploits
Enterprise Vulnerabilities From DHS/US-CERT's National Vulnerability Database
SQL injection vulnerability in ImageCMS before 4.2 allows remote authenticated administrators to execute arbitrary SQL commands via the q parameter to admin/admin_search/. NOTE: this can be leveraged using CSRF to allow remote unauthenticated attackers to execute arbitrary SQL commands.
Cross-site scripting (XSS) vulnerability in open-flash-chart.swf in Open Flash Chart (aka Open-Flash Chart), as used in the Pretty Link Lite plugin before 1.6.3 for WordPress, JNews (com_jnews) component 8.0.1 for Joomla!, and CiviCRM 3.1.0 through 4.2.9 and 4.3.0 through 4.3.3, allows remote attackers to inject arbitrary web script or HTML via the get-data parameter.
Multiple cross-site scripting (XSS) vulnerabilities in ownCloud Server before 5.0.1 allow remote attackers to inject arbitrary web script or HTML via the (1) new_name parameter to apps/bookmarks/ajax/renameTag.php or (2) multiple unspecified parameters to unknown files in apps/contacts/ajax/.
SQL injection vulnerability in addressbookprovider.php in ownCloud Server before 5.0.1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors, related to the contacts application.
SQL injection vulnerability in lib/db.php in ownCloud Server 5.0.x before 5.0.6 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.