Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocker Software

RSS Feed   
Ad Blocker Software Reports
 
API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4
sponsored by Traceable
WEBCAST: Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.
Posted: 17 Feb 2021 | Premiered: May 20, 2020

Traceable

Use Group Rules to Automate & Granularly Manage Access
sponsored by Okta
WEBCAST: Organizations using Okta for IAM know the importance of groups. But managing these groups is a hassle for admins, and it becomes more complicated as the number of users or groups increases, leading to security risks. Watch this webinar to learn how to you can use Okta’s Group Rules to automate app assignments and enforce granular access.
Posted: 01 Mar 2021 | Premiered: Mar 1, 2021

Okta

Miercom Labs: Cisco Umbrella Performance Validation Testing
sponsored by Cisco Umbrella
ANALYST REPORT: Access the results of this evaluation to learn how Cisco Umbrella's cloud-native, SASE optimized security service can boost your platform experience by reducing hop count up to 33%, improve latency and jitter by up to 73%, perform automatic data failover when needed, and more.
Posted: 22 Feb 2021 | Published: 31 Dec 2020

Cisco Umbrella

Building The Future Workplace In Businesses Services
sponsored by Ingram Micro
WHITE PAPER: With employees working both on-site and at home, businesses leaders need to make sure everyone can work productively and securely, no matter where they’re located. In this white paper, learn how Ingram Micro and Cisco can help organizations empower and secure their remote workforce.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

Ingram Micro

Market Guide for Managed Detection and Response Services
sponsored by eSentire
ANALYST REPORT: Organizations are turning to managed detection and response (MDR) services for turnkey threat detection and response via modern, remotely delivered 24/7 security operations center capabilities and technology. Use this Gartner research report to determine whether MDR is a good fit with your operational security requirements.
Posted: 16 Feb 2021 | Published: 26 Aug 2020

eSentire

SonicWall Secure SD-Branch
sponsored by SonicWall
DATA SHEET: Branch networks are quickly evolving. Secure SD-Branch can provide security, network segmentation and compliance for peace of mind on distributed networks. SonicWall Secure SD-Branch aims to simplify deployment, management and troubleshooting. Access this solution brief to explore potential benefits.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

SonicWall

3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

Universal Directory: Create One World.
sponsored by Okta
EBOOK: Directories have helped businesses manage identities, but the more identities there are to manage, the more directories are born, and the more confusion arises. Dive into this e-book to learn more about directories, then discover a central identity management system by Okta that strives to integrate users across different organizations.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

Okta

15 Experts' Questions and Answers about SASE
sponsored by Cato Networks
WHITE PAPER: SASE is, in brief, a new enterprise networking technology category introduced by Gartner in 2019. SASE solutions are cloud services that connect and secure all enterprises “edges” – datacenters, branch offices, mobile uses, and cloud resources. To learn more about SASE and explore an expert Q&A, check out this white paper.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

Cato Networks

Comparison and Analysis of Security Aspects of LoRaWAN and NB-IoT
sponsored by Telekom Deutschland GmbH
WHITE PAPER: The two most commonly used LPWA technologies today are NarrowBand IoT (NB-IoT) and Long Range Wide Area Network (LoRaWAN). While more and more IoT use cases use NB-IoT or LoRaWAN technology, security specialists have observed IoT-related attacks increasing sharply for years. In this white paper, take a look at the security of NB-IoT and LoRaWAN.
Posted: 05 Apr 2021 | Published: 05 Apr 2021

Telekom Deutschland GmbH
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences