IT Management  >   Systems Operations  >   Security  >  

OS Security

RSS Feed   
OS Security Reports
 
A Guide to AppSec in the Age of APIs & Microservices
sponsored by ThreatX
WHITE PAPER: DevOps and CI/CD pipelines are driving fast, continuous development and security needs to be able to keep pace without slowing down delivery or losing efficacy. Download this white paper to see how major shifts like these are impacting modern application security strategies today.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

ThreatX

The Hacker Report
sponsored by HackerOne
WHITE PAPER: Many hackers are finding career building opportunities through bug bounties, with companies hiring from within the hacker community at a faster clip than ever before. As hacking grows in popularity, training continues to be a focus. Download this research report that details more than 300,000 individuals who represent the hacker community today.
Posted: 08 Mar 2019 | Published: 08 Mar 2019

HackerOne

Seamless Application Security: Security at the Speed of DevOps
sponsored by Micro Focus
WHITE PAPER: Download this guide to learn how developers can start to leverage integrations to make application security a more natural part of the lifecycle – without slowing down innovation.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Micro Focus

Security for Cloud-Native Compute Will Be Different
sponsored by Aqua Security
WHITE PAPER: Access this brief to learn about security concerns associated with containers and serverless in the cloud, and what precautionary steps you can take now to mitigate any threats.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

Aqua Security

Trust But Verify: Mobile App Protection Best Practices
sponsored by Arxan
WEBCAST: This webcast explores how to evolve app security to face modern day threats and stop them before they can spread across your network. Discover a set of best practices for app security and threat mitigation, plus learn about Arxan's comprehensive app protection and alerting capabilities.
Posted: 15 Feb 2019 | Premiered: Feb 15, 2019

Arxan

Web Application Firewalls: 2018 Market Landscape
sponsored by F5 Networks
RESEARCH CONTENT: In recent years, WAFs have evolved to be more usable, scalable, and better able to respond automatically to threats. This makes them relevant in today's world of smart, motivated attackers and hybrid applications. In this research report, Forrester assess the state of the WAF market and how vendors stack up against each other.
Posted: 15 Feb 2019 | Published: 25 Jun 2018

F5 Networks

2018 Secure DevOps: Fact or Fiction?
sponsored by WhiteHat Security
WHITE PAPER: You need to build application security into continuous delivery circles, but this requires a new way of thinking about app security. Dive into this whitepaper of DevSecOps to learn how to keep your DevOps app development process from repeating the same security mistakes of the recent past.
Posted: 07 Mar 2019 | Published: 31 Dec 2018

WhiteHat Security

Carnival Navigates Sea of Data With Splunk
sponsored by Splunk Services UK Ltd
CASE STUDY: In this case study, learn how Carnival Corporation deployed the Splunk platform to increase visibility across all systems, secure shipboard systems and protect customer data. Since deploying Splunk, Carnival has seen many benefits.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk Services UK Ltd

DevSecOps at Hulu: When DevOps and Security Meet
sponsored by Signal Sciences
VIDEO: Today modern technical companies like Hulu have been adopting a culture where DevOps and security operate as one. In this webinar, hear from Emilio Escobar, Director of Information Security at Hulu, as he discusses how Hulu successfully brought security into the DevOps ecosystem, the benefits of a DevOps culture, and more.
Posted: 25 Feb 2019 | Premiered: 25 Feb 2019

Signal Sciences

The No BS Guide to Static Application Security Testing (SAST)
sponsored by WhiteHat Security
WHITE PAPER: Network security is everywhere and we have all been hyperaware of securing the perimeter and having our firewalls on high alert. Now, application vulnerabilities are being exploited and it's time to do something about it. In this best practices guide, learn the steps to take towards implementing a successful application security program.
Posted: 04 Mar 2019 | Published: 04 Mar 2019

WhiteHat Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement