Standards  >   Security Standards  >  

WS-Security

RSS Feed   
DEFINITION: WS-Security (Web Services Security) is a proposed IT industry standard that addresses security when data is exchanged as part of a Web service. WS-Security is one of a series of specifications from an industry group that includes IBM, Microsoft, and Verisign. Related specifications include the Business Process Execution Language (BPEL), WS-Coordination, and WS-Transaction. WS-Security specifies enhancements  … 

WS-Security definition sponsored by SearchMicroservices.com, powered by WhatIs.com an online computer dictionary
WS-Security White Papers (View All Report Types)
1 - 25 of 210 Matches Previous Page  |  Next Page
10 Cybersecurity Best Practices for Securing Remote Workers
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: As a result of the pandemic, organizations are being forced to re-allocate their resources in order to focus on securing their predominantly remote workers. In order to help organizations adjust to the new normal, Arctic Wolf created this checklist of 10 WFH best practices – read on to get started.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Arctic Wolf Networks, Inc.

100 Days of Coronavirus (COVID-19)
sponsored by Mimecast
WHITE PAPER: To better understand how the coronavirus pandemic has been (and will be) exploited by malicious users, Mimecast created this analyst report, 100 Days of Coronavirus (COVID-19), which analyzes activity across the first 100 days. Download the report to unlock the key trends and recommendations.
Posted: 15 Jul 2020 | Published: 31 May 2020

Mimecast

2019 CrowdStrike Global Security Attitude Survey
sponsored by CrowdStrike
WHITE PAPER: Each year, CrowdStrike conducts a Global Security Attitude Survey to better understand the current state of incident detection and response. The industry ideal is set at the 1-10-60 rule: 1 minute to detect, 10 minutes to understand, and 60 minutes to contain. Read the research results and see how close organizations came to this benchmark.
Posted: 14 May 2020 | Published: 14 May 2020

CrowdStrike

2020 Application Security Observability Report
sponsored by Contrast Security
WHITE PAPER: Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.
Posted: 21 Sep 2020 | Published: 13 Jul 2020

Contrast Security

2020 Cloud Misconfigurations Report
sponsored by DivvyCloud
WHITE PAPER: Across 2018 and 2019, data breaches caused by cloud misconfiguration resulted in the exposure of over 33 billion records, which led to a loss of nearly $5 trillion. In this report, explore the underlying causes of this threat and discover best practices for avoiding a misconfiguration-related incident.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

DivvyCloud

2020 Cost of Insider Threats Global report
sponsored by Proofpoint
WHITE PAPER: Each year, the Ponemon Institute conducts a study, known as the Cost of Insider Threats Global Report study, to dissect and examine the costs (direct and indirect) that result from insider threats. Download the report to explore the results of the 2020 study.
Posted: 09 Jun 2020 | Published: 09 Jun 2020

Proofpoint

2020 Cybersecurity Outlook Report
sponsored by VMware International Unlimited Company
WHITE PAPER: The fight between organizations trying to secure their data and cyberattackers looking for ways to steal it is a constant struggle that seems to constantly evolve. As organizations employ stronger defenses, hackers find more creative ways to bypass them. In this research report, uncover the findings from a study into the evolution of this pattern.
Posted: 01 May 2020 | Published: 01 May 2020

VMware International Unlimited Company

2020 Global Threat Report
sponsored by Crowdstrike
WHITE PAPER: Each year, the CrowdStrike Intelligence team releases a report of their findings from looking into cyberattack trends and emerging adversaries over the previous year. This year’s report examines key trends in ransomware and eCrime as well as an overview of state-sponsored adversaries and their suspected motives.
Posted: 08 Apr 2020 | Published: 08 Apr 2020


2020 State of Enterprise Cloud Adoption and Security
sponsored by DivvyCloud
WHITE PAPER: Cloud usage has been growing steadily over recent years, and that trend is expected to continue. However, misconfigurations and data breaches have led to security concerns. This report highlights the findings from a 2019 study into enterprise cloud adoption as well as security and compliance challenges. Read on to uncover the results.
Posted: 22 Apr 2020 | Published: 22 Apr 2020

DivvyCloud

2020 State of Malware Report
sponsored by Malwarebytes
WHITE PAPER: Each year, cybercriminals come up with more creative ways to infect organizations, devices and users in order to cause disruptions. In this 2020 State of Malware Report, take a closer look at some of the key attack trends in 2019 and see how the threat landscape has evolved over the last decade.
Posted: 14 Apr 2020 | Published: 29 Feb 2020

Malwarebytes

3 Powerful Ways to Slash Mobile App Security Costs
sponsored by NowSecure
WHITE PAPER: There’s never a bad time to find ways to cut costs, enhance productivity and expand security capabilities – especially when it comes to the constantly evolving mobile application landscape. Download this white paper to review 3 scenarios that showcase how automating mobile app security testing can save money while fostering productivity.
Posted: 15 Jun 2020 | Published: 15 Jun 2020

NowSecure

5 Must-Haves to Look for in a Best-in-Class IoT Security Solution
sponsored by Palo Alto Networks
WHITE PAPER: Based on Gartner’s predictions, adoption of IoT endpoint is estimated to reach 5.81 billion this year. However, in order to integrate IoT responsibly, security considerations need to be made. In this buyer’s guide, discover what to look for in an IoT security solution.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

5 Questions Every CIO Must Answer in the Coronavirus Age
sponsored by Hitachi Vantara
WHITE PAPER: The Coronavirus has completely changed the notion of a business environment, and there’s no telling when employees will be back in the office, if ever. In order to help IT and security leaders address these challenges, this white paper offers 5 questions for CIOs to ask themselves right now regarding identity and access management (IAM).
Posted: 25 Jun 2020 | Published: 23 Jun 2020

Hitachi Vantara

7 Ways to Take Cybersecurity to New Levels
sponsored by Cisco Umbrella
WHITE PAPER: Contrary to popular belief, more security tools don’t always mean better security. As business environments grow more complex, it’s critical for security to have a holistic, unified approach. Read this white paper to discover 7 ways organizations can enhance their security stack with cloud security, without sacrificing customization and control.
Posted: 21 May 2020 | Published: 21 May 2020

Cisco Umbrella

A Holistic Approach to Securing Kubernetes That Integrates Culture and Technology
sponsored by DivvyCloud
WHITE PAPER: Today’s ever-evolving cloud and container environments paves the way for both innovation and security headaches. In this white paper, discover how integrating a holistic approach for meeting regulatory requirements with Kubernetes can help provide a competitive advantage.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

DivvyCloud

A Proven Approach to Cloud Workload Security
sponsored by CrowdStrike
WHITE PAPER: As a cybersecurity company that has built one of the biggest cloud architectures in the world, CrowdStrike has gained an exceptional vantage point and garnered unique experience on what it takes to secure cloud workloads. Read this white paper to uncover CrowdStrike’s lessons learned, observational insights and expertise.
Posted: 12 Aug 2020 | Published: 12 Aug 2020

CrowdStrike

A Risk-Based Approach to Insider Threat Detection for Federal Government Agencies
sponsored by Merlin International
WHITE PAPER: Malicious insiders, regardless of motive, continue to establish themselves as a major threat, especially amongst United States federal government agencies. This white paper offers comprehensive insights into the role of privileged access management as an effective countermeasure against insider threats – read on to get started.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Merlin International

A Security Engineer’s Nightmare
sponsored by Cribl.io
WHITE PAPER: For security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Cribl is helping security engineers log information and incidents so they can focus their efforts on more important tasks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Cribl.io

Achieving CloudSecOps Maturity
sponsored by DivvyCloud
WHITE PAPER: When it comes to establishing cloud security operations (CloudSecOps) methods, organizations tend to begin with in-house solutions. In this white paper, discover the limitations of in-house solutions, and realize when it’s time to look elsewhere.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

DivvyCloud

Achieving HIPAA Compliance: Your Guide to Avoiding HIPAA and HITECH Penalties
sponsored by Absolute Software Corporation
WHITE PAPER: The HITECH Act of 2013 expanded who was considered a covered entity (CE) when it came to HIPAA compliance. This whitepaper provides an introductory overview of key consideration areas and guidance for getting started to help your organization avoid HIPAA and HITECH penalties – download now to get started.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

Absolute Software Corporation

Addressing Digital Risks in Business-Critical Infrastructures
sponsored by Schneider Electric
WHITE PAPER: In the age of digital transformations and the Internet of Things (IoT), cybersecurity needs to be front of mind in order to prevent costly disruptions. But as hackers grow increasingly clever, maintaining security in these environments becomes difficult. Read this white paper to learn more about the common risks and how to address them.
Posted: 29 May 2020 | Published: 29 May 2020

Schneider Electric

Aeris Whitepaper: IoT Device Security: Understanding IoT Security Rules and Regulations
sponsored by Aeris
WHITE PAPER: Customers whose IoT programs collect personally identifiable data should keep security top of mind to ensure they’re compliant with local, national and global data privacy regulations. Read this white paper too learn more about IoT device security and how the landscape is affected by data privacy rules and regulations.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Aeris

Access Certification: Addressing and Building on a Critical Security Control
sponsored by Oracle Corporation
WHITE PAPER: This white paper discusses the forces driving security controls related to access and how to use automated access certification processes to address these critical issues. The detailed whitepaper walks thorugh the key components of an enterprise-grade access certification solution and highlights the results achieved by customers.
Posted: 21 Mar 2011 | Published: 01 Jan 2010

Oracle Corporation

Achieving PCI compliance with Dell SecureWorks' security services
sponsored by DellEMC and Intel®
WHITE PAPER: It is imperative that your organization meets the security requirements of PCI DSS and other compliance measures in order to ensure that your sensitive data is protected. View this paper to discover how a leading security provider can help secure your network while ensuring compliance.
Posted: 18 May 2011 | Published: 18 May 2011

DellEMC and Intel®

Addressing Compliance Initiatives with Center for Internet Security Benchmarks
sponsored by Tripwire, Inc.
WHITE PAPER: This whitepaper details the background you need to build an effective compliance program by understanding benchmarks, the basic building blocks of compliance initiatives. You'll learn about the benchmarks specified by the Center for Internet Security (CIS), which are often used as a starting point for creating a compliance initiative.
Posted: 30 Mar 2009 | Published: 01 Jan 2009

Tripwire, Inc.
1 - 25 of 210 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info