IT Management  >   Systems Operations  >   Security  >  

OS Security

RSS Feed   
OS Security Reports
 
Everything You Need to Know About Getting Application Security Buy-in
sponsored by Veracode, Inc.
WHITE PAPER: Application security impacts multiple groups across the entire organization. Read this paper to learn everything you need to know about getting these groups to buy-in on application security.
Posted: 02 Aug 2018 | Published: 02 Feb 2018

Veracode, Inc.

6 Ways a CASB Makes Cloud Apps Safe for Business
sponsored by Symantec
RESOURCE: Learn how a Cloud Access Security Broker (CASB) can enable you to control cloud chaos across all your apps and data.
Posted: 25 Oct 2018 | Published: 25 Oct 2018

Symantec

Computer Weekly – 27 November 2018: Software patching at scale – how to make it work
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

ComputerWeekly.com

The StackRox Container Security Platform
sponsored by StackRox
WHITE PAPER: In this data sheet find out how a container security platform can reduce security risks to your containerized, cloud-native applications during the build, deploy, and run phases.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

StackRox

Are Your Defenses Against Web Application Attacks Falling Further Behind?
sponsored by ThreatX
RESEARCH CONTENT: Dive into this 11-page Frost & Sullivan Report to learn why web applications are under attack, the costs associated with an attack and how you can revamp your current web application firewall strategy to continue your business engagements with confidence.
Posted: 28 Jun 2018 | Published: 30 Jun 2018

ThreatX

Putting the "Security" in Secure Remote Access
sponsored by Citrix
WHITE PAPER: Learn how Citrix NetScaler Unified Gateway can deliver comprehensive secure remote access for your application environment.
Posted: 23 Oct 2018 | Published: 23 Oct 2018

Citrix

CISO Panel Webinar: Reducing the Cyber Exposure Gap from Cloud to Containers
sponsored by Tenable
WEBCAST: Tune into this webinar as 5 different CISOs and executives give their point of view on how to minimize your attack surface, expand visibility of assets beyond the perimeter, and enhance your security practices.
Posted: 10 Aug 2018 | Premiered: Mar 15, 2018

Tenable

Leading Banks Eye APIs to Leapfrog the Competition
sponsored by MuleSoft
WHITE PAPER: Application Programming Interfaces (APIs) have emerged as essential tools and critical enablers to help businesses meet new consumer expectations and add new functionality. Read this white paper to learn more about the role of APIs and how this new ecosystem will help organizations create new revenue streams.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

MuleSoft

Say Hello to the Software-Defined Perimeter (SDP)
sponsored by Zscaler
ANALYST REPORT: ESG predicts that the challenge of using legacy methods will serve as a catalyst for a new user and application-centric approach to secure internal applications – software-defined perimeter (SDP). In this ESG report, explore the rise of software-defined perimeters and its many use cases.
Posted: 10 Oct 2018 | Published: 31 May 2018

Zscaler

Is Your WAF Keeping Pace With Today's Threats?
sponsored by F5 Networks
WHITE PAPER: Cyberattackers are starting to target the application layer, which if breached allows attackers to access the interfaces that hosts use to communicate and access information sent over a network. Read this white paper to learn how to choose a web app firewall (WAF) that protects your network.
Posted: 26 Sep 2018 | Published: 26 Sep 2018

F5 Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement