IT Management  >   Systems Operations  >   Security  >  

OS Security

RSS Feed    Add to Google    Add to My Yahoo!
OS Security Reports
 
Prepare Yourself for the Cybercrime of 2015
sponsored by FireEye
WHITE PAPER: This 2015 cybercrime report analyzes the threats of 2014 and makes predictions for what you need to be prepared for in the upcoming year.
Posted: 02 Apr 2015 | Published: 31 Dec 2014

FireEye

Quarterly Cyberthreat Report
sponsored by IBM
WHITE PAPER: In this quarterly security report, discover what lessons have been learned in 2014 and how cybersecurity needs to evolve in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015

IBM

Case Study: Achieve Greater Agility, Improved Performance and Enhanced Security in Release Process
sponsored by SERENA Software, Inc.
CASE STUDY: Inside this brief case study, learn how one organization implemented a software platform in order to manage the release life-cycle post development handover.
Posted: 10 Apr 2015 | Published: 31 Mar 2015

SERENA Software, Inc.

The Importance of Secure Application Development Lifecycles
sponsored by White Hat Security
EGUIDE: This expert e-guide lays out four steps to implementing secure code. View now to learn how to develop the skills to mitigate malware attacks at the application layer. Additionally, examine the the myths about compliance-ready web app security assessment tools.
Posted: 07 May 2015 | Published: 11 Mar 2015

White Hat Security

The Real Cost of Driverless Cars for Cybersecurity and Reliability
sponsored by Rogue Wave Software
WHITE PAPER: Several car manufacturers predict that self-driving cars will be on the road by 2020. What are the implications of the rapid increase in automotive software complexity for cybersecurity and reliability as development teams race to deliver this content?
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Rogue Wave Software

HP Global 2000 Mobile Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
Posted: 01 Feb 2015 | Published: 18 Aug 2014

Hewlett-Packard Company

Tips to Ensure Smooth Application Deployment and Performance
sponsored by SERENA Software, Inc.
EGUIDE: In this expert guide, you'll learn how a unified DevOps approach to app development, deployment, and runtime management can avoid these dreaded issues and simplify application lifecycle management as a whole. In addition, you'll uncover 7 helpful tips for improving the deployment process.
Posted: 08 May 2015 | Published: 07 May 2015

SERENA Software, Inc.

An Inside Look at the Azure Active Directory
sponsored by Microsoft
VIDEO: In this video, learn about Microsoft's Azure Active Directory from a developer's standpoint and get a glimpse of the new identity features in Visual Studio 2015 that make it easy to secure applications with Azure AD
Posted: 01 May 2015 | Premiered: 01 May 2015

Microsoft

Expert: "Web app design at the core of coding weaknesses, attacks"
sponsored by GeoTrust, Inc.
EGUIDE: Access this expert eGuide to learn how rethinking coding practices can fix glitches that cause security weaknesses. Read on for an in-depth perspective of how coding can impact cyber-attack prevention.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

GeoTrust, Inc.

The Evolution of Enterprise Application Security
sponsored by Prevoty
WHITE PAPER: This white paper examines the emergence of application self-protection technologies and why WAFs can't offer true app security despite common perception.
Posted: 13 Apr 2015 | Published: 14 Jan 2015

Prevoty
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement