IT Management  >   Systems Operations  >   Security  >   Web Application Security  >  

XML Web Services Security

RSS Feed   
DEFINITION: Web Services Trust Language (WS-Trust) is a specification that uses the secure messaging mechanisms of WS-Security to facilitate trust relationships in diverse Web service environments. WS-Trust is an integral part of the Microsoft model for a standards-based distributed identity infrastructure. WS-Trust also an important element of Windows CardSpace, an interface intended for the exchange of user  … 

XML Web Services Security definition sponsored by SearchMicroservices.com, powered by WhatIs.com an online computer dictionary
XML Web Services Security Multimedia (View All Report Types)
 
Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation
sponsored by Intel
WEBCAST: This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.
Posted: 14 Feb 2011 | Premiered: Oct 13, 2010

Intel

Video: Cloud Infrastructure on IBM Power Systems
sponsored by IBM
WEBCAST: Tuning into this video grants you access to see an infrastructure platform designed to support a variety of cloud models, including private, hybrid, and public cloud. You'll learn the advantages of using this purpose-built platform, featuring OpenStack-based management and open source automation.
Posted: 07 Mar 2018 | Premiered: Nov 30, 2017

IBM

Cyber Threats: Is Your Team Up to the Challenge?
sponsored by Juniper Networks
WEBCAST: In this webcast, gain valuable insight into how to adapt your IT security teams to overcome the evolving cybersecurity landscape.
Posted: 19 Feb 2018 | Premiered: Aug 31, 2017

Juniper Networks

Start Your Digital Transformation with SAP HANA and the Right Infrastructure
sponsored by IBM
VIDEO: This webcast dives in-depth into the benefits of running SAP HANA on IBM POWER Systems. Tune in as three experts talk through real-world cases of running HANA on POWER, and the results, including how the pair provides higher throughput to deliver fast business results, and more.
Posted: 20 Feb 2018 | Premiered: 13 Sep 2017

IBM

Analytical Stories: How I Learned to Stop Worrying and Respond to Threats
sponsored by Splunk
WEBCAST: This webcast is designed to help you make threat analytics a reality, so you can stop worrying and start fighting back. Watch now to learn how to develop analytical stories, the 4 types of searches you can complete within said stories, and more.
Posted: 13 Oct 2017 | Premiered: Sep 26, 2017

Splunk

Web Application Authorization and Authentication Explained
sponsored by WhiteHat Security
VIDEO: According to the 2017 Verizon DBIR, 30% of total breaches reported involved attacks on web applications. Explore this webinar to gain insight into application authorization and authentication in order to enhance your application security program.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

WhiteHat Security

Cross-Site Scripting Attacks: Identify and Defend against Malicious Code
sponsored by WhiteHat Security
VIDEO: Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code across web and mobile apps faster.
Posted: 22 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

Payer's Place in the Healthcare Ecosystem Keys to Success
sponsored by HealthEdge
VIDEO: Learn how payers, providers and consumers can collaborate effectively, and about the transformation from fee for service to paying for value.
Posted: 10 Nov 2017 | Premiered: 02 Nov 2017

HealthEdge

Experience Dynamic Endpoint Threat Defense
sponsored by McAfee, Inc.
VIDEO: Simplify your system and stay ahead of advanced threats with a collaborative framework that shares threat intelligence.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

Steps to Secure the Industrial Internet of Things
sponsored by Bayshore Networks
VIDEO: By taking the complex physical machinery of manufacturing and connecting it to your network, you can drive down costs and unlock new levels of insights into sensor data. However, more connected devices also means more risk. Watch this brief video to learn about IDC's steps for securing industrial IoT (IIoT).
Posted: 30 May 2017 | Premiered: 29 Nov 2016

Bayshore Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement