IT Management  >   Systems Operations  >   Security  >  

OS Security

RSS Feed   
OS Security Reports
 
Smooth the Transition to the Cloud with Radware’s Secure ADC Solutions
sponsored by Radware
DATA SHEET: Many enterprises are transitioning to the cloud. As a result, their focus shifts from infrastructure-centric environments to application-centric solutions. This creates the unique challenge of how to make advanced services, such as application delivery and security simpler to consume and maintain. In this brief, learn how Radware’s ADC can help.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Radware

SAP Security Today: Five Challenges For CIOs
sponsored by Onapsis
WHITE PAPER: As cybercrime rates rise annually, the role of the CIO has shifted with the need to constantly produce and review a holistic security strategy. In this e-book, take a look at the 5 challenges CIOs face today with SAP security and how to combat those challenges using a holistic SAP security strategy.
Posted: 20 Apr 2020 | Published: 20 Apr 2020

Onapsis

Ensuring Cloud Security and Compliance in the Financial Services Industry
sponsored by DivvyCloud
WHITE PAPER: In order to meet customer demands, financial service organizations are embracing mobile banking applications. However, teams should be aware of the additional security threats associated with organizational changes. Download this white paper and learn how to ensure cloud security and compliance while embracing digital transformation.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

DivvyCloud

How to Ensure NIAP Mobile Application Compliance
sponsored by NowSecure
WHITE PAPER: Mobile applications allow for improved business operations and more seamless experience. However, for federal agencies, the heavy burden of ensuring each app meets the National Information Assurance Partnership (NIAP) security requirements causes a massive roadblock. Download this white paper to learn ease this headache.
Posted: 19 Jun 2020 | Published: 19 Jun 2020

NowSecure

12 Reasons Why You Need Stronger Mobile App Security
sponsored by NowSecure
RESOURCE: Whether it’s for internal communication, enhancing customer experience or part of a digital transformation initiative, mobile applications play a critical role and ensuring their protection is paramount. Download this infographic to discover 12 reasons why organizations need stronger mobile app security strategies.
Posted: 22 Jun 2020 | Published: 22 Jun 2020

NowSecure

Jitterbit Secures Dynamic Cloud Environment, Containers, and Microservices at Scale.
sponsored by Lacework
CASE STUDY: In this case study, discover how Jitterbit, and API service provider, was able to address issues related to monitoring activity within their expanding platform by partnering with Lacework to enable holistic activity tracking, streamlined compliance reporting and comprehensive security – without disruption.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Lacework

How to Protect Against the OWASP Top 10 and Beyond
sponsored by F5 Networks
RESOURCE: VERACODE NOTED THAT 72% OF ALL APPLICATIONS HAD AT LEAST ONE VULNERABILITY.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

F5 Networks

Shifting Cloud Security Left with Infrastructure as Code
sponsored by DivvyCloud
WHITE PAPER: DevOps has forever changed the software development lifecycle for the better. But what is the role of DevOps in ensuring cloud security and compliance? This white paper highlights how addressing key challenges can be addressed by shifting cloud security left – avoiding misconfigurations and misalignments. Read on to learn more.
Posted: 22 Apr 2020 | Published: 22 Apr 2020

DivvyCloud

AVOIDING CONTAINER VULNERABILITIES
sponsored by Lacework
WHITE PAPER: Open this white paper to get a better understanding of the potential risks associated with containers and how best to address these risks.
Posted: 28 May 2020 | Published: 28 May 2020

Lacework

Maintaining the Security Posture
sponsored by Onapsis
WHITE PAPER: Based on the critical nature of Enterprise Resource Planning (ERP) applications, they are often under attack by cybercriminals looking to cause disruptions. In this white paper, explore the top threats facing your business-critical applications and discover a list of security recommendations to help you get started.
Posted: 16 Apr 2020 | Published: 16 Apr 2020

Onapsis
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info