Standards  >   Security Standards  >  

WS-Security

RSS Feed   
DEFINITION: WS-Security (Web Services Security) is a proposed IT industry standard that addresses security when data is exchanged as part of a Web service. WS-Security is one of a series of specifications from an industry group that includes IBM, Microsoft, and Verisign. Related specifications include the Business Process Execution Language (BPEL), WS-Coordination, and WS-Transaction. WS-Security specifies enhancements  … 

WS-Security definition sponsored by SearchMicroservices.com, powered by WhatIs.com an online computer dictionary
WS-Security Multimedia (View All Report Types)
1 - 25 of 76 Matches Previous Page  |  Next Page
3 Steps to Secure Remote Workers and Students
sponsored by Cisco Umbrella
VIDEO: As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.
Posted: 05 May 2020 | Premiered: 30 Mar 2020

Cisco Umbrella

Achieving security and compliance in Red Hat OpenShift Dedicated
sponsored by Red Hat
VIDEO: In this webinar from Red Hat’s online Security Symposium, join distinguished Red Hat expert Bill Montgomery as he offers a closer look at Red Hat’s OpenShift Dedicated (OSD), highlighting 8 key security and compliance features, the benefits of a hosted vs. self-managed models, and more – watch now to get started.
Posted: 25 Jan 2021 | Premiered: 25 Jan 2021

Red Hat

API Security & the OWASP API Top 10
sponsored by Traceable
VIDEO: The OWASP API Top 10 project set out with a clear goal – to identify and provide insight into the most detrimental API vulnerabilities that exist across today’s organizations. Watch this episode of The API Security & the OWASP API Top 10 webinar series for a deep dive into 4 of the 10 critical API threats.
Posted: 17 Feb 2021 | Premiered: 03 Jan 2021

Traceable

Are Your Apps in the Race to Win?
sponsored by WhiteHat Security
WEBCAST: For modern organizations, applications play a prominent role in both internal operations and interacting with end-users. As a result, application security has become critical. Watch this webinar to learn more about AppSec and why it’s critical for digital transformation initiatives.
Posted: 11 Dec 2020 | Premiered: Dec 11, 2020

WhiteHat Security

Ask a CISO Ep. 04: Hard Truths in Cloud Security
sponsored by Horangi
PODCAST: In this episode of the Ask a CISO podcast, Horangi Director of Cloud Security Engineering Steve Teo joins Horangi Deputy Director of Cyber Operations Mark Fuentes to delve into the nature of cloud data breaches today and how organizations in the cloud can adapt to this growing risk – listen in to unlock their expert insight.
Posted: 04 Feb 2021 | Premiered: Feb 4, 2021

Horangi

Attack Simulation
sponsored by Cybereason
VIDEO: In this attack simulation, Cybereason security leaders provide a hands-on demonstration of a multi-stage attack in order to showcase the possible entry points for an attack and how to best prevent and defend against these threats – watch now to get started.
Posted: 05 Feb 2021 | Premiered: 05 Feb 2021

Cybereason

Auth0 Platform Introduction
sponsored by Auth0
WEBCAST: This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.
Posted: 02 Jul 2020 | Premiered: Jul 2, 2020

Auth0

Automating TLS provisioning with OpenShift Service Mesh
sponsored by Red Hat
VIDEO: Traditional application servers are being replaced by modern application microservices architectures that enable distributed workforces to collaborate. This webinar highlights the importance of using mutual TLS (mTLS) to secure communications between services and overviews some of the nuances about its setup – watch now to get started.
Posted: 21 Jan 2021 | Premiered: 21 Jan 2021

Red Hat

Beta Systems IAM: Protection From The Inside Perpetrator
sponsored by Beta Systems
VIDEO: It’s a common misconception that cyberattacks originate from external hackers. However, it’s been found that inside perpetrators – usually current or former employees – present a serious risk. Watch this video to learn more about Beta Systems IAM and how it’s enabling organizations to protect sensitive data and prevent internal threats.
Posted: 04 Nov 2020 | Premiered: 01 Oct 2020

Beta Systems

Bitdefender Endpoint Detection and Response (EDR)
sponsored by Bitdefender
VIDEO: Data breaches spiked in 2020 – affecting nearly every country and industry vertical. COVID-19 certainly was part of the issue – but outdated and traditional security methods also share the responsibility. Watch this short video to learn about the tools and capabilities required to meet the demands of today’s cyberthreats.
Posted: 11 Feb 2021 | Premiered: 11 Feb 2021

Bitdefender

BlackBerry Cyber: Video
sponsored by BlackBerry
VIDEO: According to a recent Gartner survey, leaders are planning to allow remote work even in the post-pandemic world. Watch this webinar to learn how BlackBerry is working with organizations to establish a long-term plan to secure their remote workforce.
Posted: 30 Dec 2020 | Premiered: 30 Dec 2020

BlackBerry

Bridge your Executive Team
sponsored by WhiteHat Security
WEBCAST: Application security is becoming increasingly important as applications play a more prominent role in driving today’s economy. Watch this webinar to learn more about the current state of AppSec, the challenges security teams are facing and how to get executive buy-in for AppSec initiatives.
Posted: 16 Dec 2020 | Premiered: Dec 16, 2020

WhiteHat Security

Building Security Best Practices with AWS & CrowdStrike
sponsored by AWS & CrowdStrike
WEBCAST: As work environments and the threats targeting them change, so too do industry best practices designed to help your organizations protect its users and critical data. Watch this AWS and CrowdStrike webinar to learn more about building security best practices.
Posted: 21 Dec 2020 | Premiered: Dec 21, 2020

AWS & CrowdStrike

Carbon Black WM
sponsored by VMware International Unlimited Company
VIDEO: Research suggests that the 2020 pandemic has been the catalyst for some of the worst cyberattacks on organizations in recent memory. In this video, join Bryan Glick (Computer Weekly) and Greg Foss (VMware Carbon Black) as they discuss the evolving challenges of cybersecurity, why they're happening and what your organization can do about it.
Posted: 28 Oct 2020 | Premiered: 28 Oct 2020

VMware International Unlimited Company

Cisco – Experience Simplified with SecureX Video
sponsored by Cisco
VIDEO: In the era of digital transformations and cloud migrations, security and simplicity are crucial. Watch this short video to learn how your users can ensure a simplified and security cloud migration or digital transformation with SecureX.
Posted: 02 Feb 2021 | Premiered: 14 Jul 2020

Cisco

Creating Digital Trust: Anchoring Remote Users to Real Identities
sponsored by Onfido
VIDEO: As a result of recent data breaches and modern technology advances, users are demanding a seamless experience that doesn’t skimp on security either. So, how can organizations establish trust and achieve identity verification through digital mediums? Watch this video to find out.
Posted: 23 Jul 2020 | Premiered: 03 Jun 2020

Onfido

Detecting and Defending Against SSRF
sponsored by WhiteHat Security
WEBCAST: Server-side request forgery (SSRF) attacks are a critical threat to be aware of in today’s landscape – targeting restricted information by manipulating server sent requests in order to gain access. This WhiteHat webinar provides a comprehensive overview of SSRF, how it operates, common weak points, and how to defend against it – watch now.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

WhiteHat Security

DevOps Security, Monitoring & Compliance with OpenShift and Sysdig
sponsored by Red Hat
VIDEO: IT, cloud and DevOps-related risks are on the rise and addressing these challenges alone can be resource-intensive. In this webinar, join experts at Red Hat and Sysdig as they discuss how to extend security, compliance and monitoring capabilities with a secure-by-design platform – watch now to get started.
Posted: 21 Jan 2021 | Premiered: 21 Jan 2021

Red Hat

Does your AppSec Program Get An A+?
sponsored by WhiteHat Security
WEBCAST: Applications are critical to an organization’s ability to communicate internally as well as with end-users or other third parties. As a result, apps are a quickly becoming a prime target for cybercriminals. Watch this webinar to learn more about the AppSec landscape, including what the common threats are and where pressure is rising.
Posted: 07 Dec 2020 | Premiered: Dec 7, 2020

WhiteHat Security

Equifax and the 147 Million: One Individual’s Story from behind the Headlines
sponsored by Auth0
VIDEO: What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.
Posted: 20 May 2020 | Premiered: 30 Mar 2020

Auth0

Faster Threat Detection and Response with Data Science and Next-gen SIEM
sponsored by Cysiv
VIDEO: Given the implications of a successful cyberattack, the need for effective threat detection and response has never been more urgent. In this short webinar, the Chief Technical Officer at Cysiv provides an overview of how threat detection and SIEM objectives can benefit from the use of data science. Watch now to learn more.
Posted: 19 Aug 2020 | Premiered: 19 Aug 2020

Cysiv

Fortinet FortiGate: Bridging the cloud security gap
sponsored by Fortinet, Inc.
VIDEO: Cloud adoption is on the rise, and organizations need to ensure they’re scaling without compromising efficiency, reliability, security or control. Watch this short video to see how Fortinet is helping organization bridge this gap.
Posted: 14 Jan 2021 | Premiered: 14 Jan 2021

Fortinet, Inc.

Automated Compliance: Making the Case and Reaping the Rewards
sponsored by Tripwire, Inc.
PODCAST: Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.
Posted: 30 Mar 2009 | Premiered: Mar 30, 2009

Tripwire, Inc.

Dirk Hohndel on Intel and the Linux Foundation
sponsored by Intel
VIDEO: In this video, Dirk Hohndel, Chief Linux and Open Source Technologist at Intel, discusses the importance of standards organizations like the Linux Foundation as well as thought on the future of Open Source at Intel.
Posted: 01 Nov 2010 | Premiered: 01 Nov 2010

Intel

Enterprise Security Checklist
sponsored by Code42
WEBCAST: This 6-item checklist provides key recommendations to help boost security against today's cybercrime.
Posted: 08 Oct 2013 | Premiered: Nov 14, 2013, 13:00 EST (18:00 GMT)

Code42
1 - 25 of 76 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info