IT Management  >   Systems Operations  >   Security  >  

OS Security

RSS Feed   
OS Security Reports
 
Introduction to IAST
sponsored by Contrast Security
WHITE PAPER: Interactive Application Security Testing (IAST) is a technology for automatically identifying and diagnosing software vulnerabilities in applications and APIs. IAST continuously monitors your applications for vulnerabilities from within. In this white paper, learn everything you need to know about IAST.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

Contrast Security

A Security Guide to Container Orchestration
sponsored by Lacework
WHITE PAPER: It's hard to argue against the benefits of containers and containerized apps running on cloud resources. However, containers create new cloud security challenges. Download this Security Guide to Container Orchestration to learn how you can stay secure in your various cloud environments today.
Posted: 29 May 2019 | Published: 29 May 2019

Lacework

DevOps Security for Cloud and Containers
sponsored by Lacework
EBOOK: In this e-book, learn how technology differences between development, staging, and product environments can lead to much larger security problems, how microservices deployed as containers help eliminate vulnerabilities, and much more.
Posted: 30 May 2019 | Published: 30 May 2019

Lacework

Navigating the path to secure micro-segmentation in hybrid and multi-cloud data centers
sponsored by Guardicore
WHITE PAPER: The path to implementing micro-segmentation isn't a straight line; without the right approach to discovering, understanding and controlling application flows you can encounter several challenges. In this solution brief, learn how Guardicore Centra Security Platform can help you successfully navigate the path to micro-segmentation in 3 steps.
Posted: 18 Jun 2019 | Published: 18 Jun 2019

Guardicore

Micro-services: Patterns and Nimbleness
sponsored by Crowd Machine
RESOURCE: How can your organization take advantage of the agility, scalability, and flexibility that micro-services offer? View this blog post to find out.
Posted: 14 Aug 2019 | Published: 02 Apr 2019

Crowd Machine

The 4 Types of Threat Detection
sponsored by Dragos
WHITE PAPER: Threat detection comprises 1 of the 3 core cybersecurity functions along with prevention and response. But, detection plays an outsized role as arguably the most important cybersecurity function in an "assume breach" world. In this white paper, explore the 4 types of threat detection, how they are derived and the uses for each.
Posted: 01 Aug 2019 | Published: 13 Jul 2018

Dragos

Protecting Against Threats with Updated Application Security Testing
sponsored by WhiteHat Security
ANALYST REPORT: In this Technology Spotlight report, IDC recommends application security testing tools that integrate security throughout the entire software development life cycle. Read on for an in-depth look at the role of WhiteHat Security in the marketplace for application security testing solutions.
Posted: 14 May 2019 | Published: 14 May 2019

WhiteHat Security

x86 to LinuxONE Redbook
sponsored by IBM
WHITE PAPER: LinuxONE is a portfolio of hardware, software, and solutions for an enterprise-grade Linux environment. It has been designed to run more transactions faster and with more security and reliability specifically for the open community. In this white paper, learn about the process of migrating from x86 to LinuxONE.
Posted: 10 Oct 2019 | Published: 31 Jan 2017

IBM

Establish Secure DevOps Practices
sponsored by Centrify Corporation
WEBCAST: The introduction of microservices, container-based architectures, and DevOps practices have led to a revolution in software development. However, security can be an afterthought when adopting these. In this webcast, explore DevSecOps and how it can help your organization take the "fast lane" through security into production.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

The Evolving API Security Landscape
sponsored by Ping Identity Corporation
WHITE PAPER: Over the last couple of years, the API security landscape has significantly shifted and expanded due to growing threats and the evolving life-cycle for deploying, managing, testing and operating APIs. Download this white paper for an overview of how we got here, where things are going, and how the landscape is beginning to rapidly shift and evolve.
Posted: 03 Oct 2019 | Published: 03 Oct 2019

Ping Identity Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement