IT Management  >   Systems Operations  >   Security  >  

Software Security

RSS Feed    Add to Google    Add to My Yahoo!
Software Security Reports
 
Case Study: Taking a Bite Out of Onboarding Costs
sponsored by Nexmo
WHITE PAPER: Explore this case study to discover how one food delivery app solved its authentication issues, and dramatically decreased onboarding costs. Read on to learn how you can keep your users happy and eliminate fraud vulnerabilities.
Posted: 22 Apr 2015 | Published: 22 Apr 2015

Nexmo

Four Considerations for Addressing the DDoS Risk for Carriers and Cloud Hosting Providers
sponsored by Radware
WHITE PAPER: In this white paper, you'll learn the four key considerations for addressing sophisticated DDoS attacks.
Posted: 01 Apr 2015 | Published: 15 Jan 2015

Radware

Why Outsourcing CRM Doesn't Mean That You Can Outsource Data Protection
sponsored by BitGlass
WHITE PAPER: This white paper explains why enterprises utilizing cloud applications like Salesforce should consider investing in a cloud access security broker, which restores data protection and visibility to your IT team while respecting user privacy.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

Five Simple Strategies for Securing APIs
sponsored by CA Technologies.
EBOOK: This guide provides an overview of the unique risk profile of APIs and offers 5 simple solutions to counter common threats to their security.
Posted: 11 Jun 2015 | Published: 11 Jun 2015

CA Technologies.

Web Security: Revenge of the Vuln
sponsored by White Hat Security
WEBCAST: Join web security guru Robert "RSnake" Hansen in this webinar for an in-depth explanation of the many vulnerabilities you may not have considered, and discover how you can better protect your new creation. View it now and learn how to stop attacks like Heartbleed, SQL injection, command injection and more.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

White Hat Security

Protecting Applications from the Server to the Endpoint
sponsored by Bit9 + Carbon Black
WHITE PAPER: This brief white paper examines a holistic security approach to prevent data breaches.
Posted: 18 Jun 2015 | Published: 27 Mar 2015

Bit9 + Carbon Black

Secure Mobile Access: Overcoming Today's BYOD Obstacles
sponsored by Dell Software
WHITE PAPER: This white paper examines the need for a holistic security strategy to address the end-to-end mobility and BYOD challenges.
Posted: 28 May 2015 | Published: 19 May 2015

Dell Software

Trouble With Application Security? It's Time to Consider Web Application Firewalls
sponsored by Citrix
EGUIDE: Access this expert e-guide to find out how WAF can support secure application development.
Posted: 12 Feb 2015 | Published: 12 Feb 2015

Citrix

Application Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn about new app security tools you can use to vet open source libraries and manage security vulnerabilities.
Posted: 03 Feb 2015 | Premiered: 02 Dec 2014

SearchSecurity.com

Mobile App Security: All You Need to Know
sponsored by Maas360 by IBM
WEBCAST: This webcast helps mobile application developers embed enterprise-grade security in their applications.
Posted: 25 Feb 2015 | Premiered: Feb 25, 2015

Maas360 by IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement