IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed   
Operating System Security Reports
 
Veracode Integrations
sponsored by Veracode, Inc.
EBOOK: To keep up with the shift to DevOps and rapid release cycles, application security solutions need to integrate into security and development teams’ existing tools and processes. Learn how the Veracode Application Security Platform integrates with the development, security and risk-tracking tools you may already be using.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

Veracode, Inc.

Machine Learning for Finding Programming Defects and Anomalies
sponsored by Valbrio
WHITE PAPER: While static analysis tools can be useful for finding programming flaws and security vulnerabilities in code, they are beginning to be replaced by machine learning-driven tools that can anticipate flaws rather than scan for pre-determined ones. Read on to learn how machine learning is driving this new method of application design.
Posted: 06 Mar 2020 | Published: 25 Dec 2019

Valbrio

State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: Download this 57-page e-book which covers the entire state of software security with data covering identifying new trends, the biggest security questions to address, and 3 key takeaways.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

Veracode, Inc.

Contrast Assess Route Intelligence
sponsored by Contrast Security
DATA SHEET: Learn how Contrast Assess Route Intelligence transforms AppSec by observing the routes of an application while it’s running—thereby exposing all the different points of entry into the application.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

Contrast Security

Javascript vs Javascript: Performance Penalty of Api Hooking
sponsored by Tala Security
WHITE PAPER: While it’s intuitive that defending your code is an important practice, there are times when that defense comes at a high cost.In this white paper, get an overview of the performance penalties associated with hooking browser JavaScript APIs to defend against JavaScript based threats.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Tala Security

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: Although applications are critical to how businesses operate, web apps are among the top risk areas that hackers attempt to expose. In fact, nearly 40% of global data breaches originate at the application-layer. In this guide, discover what effective application security looks like and learn the steps you can take to reach app sec maturity.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Veracode, Inc.

Secure Your Business-Critical Applications
sponsored by Onapsis
PRODUCT OVERVIEW: An attack on your SAP and Oracle EBS applications would have a devastating impact on your organization's financial well-being and reputation, yet security remains a blind spot. In this solution brief, learn how Secure the Core by Onapsis protects your ERP systems from internal and external threats.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Onapsis

Rethinking Data Protection: The Human-centric Approach
sponsored by Forcepoint
EBOOK: It’s predicted that there will be 1.87 billion mobile workers worldwide by 2022, representing 42.5% of the global workforce. As mobile devices grow, the idea of a traditional perimeter begins to fade. Download this e-book and learn why organizations are adopting a user & data-centric approach to multi-cloud security.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Forcepoint

2019 State of DevOps Report
sponsored by Splunk
WHITE PAPER: While security is often one of the most dreaded or ignored aspects of product development, it ironically has become one of the biggest proponents to successful development lifecycles. Download your copy of this development lifecycle report which includes finds on the state of DevOps, security best practices, and more.
Posted: 07 Oct 2019 | Published: 07 Oct 2019

Splunk

Implementing Privacy Policy: Application Security the Easy Way
sponsored by Ionic Security
WEBCAST: The fundamental issue with data protection is that security is often siloed, but sensitive data isn’t, leaving apps and data at risk. This webcast takes a closer look at Ionic Machina, which focuses on data protection through scalability, visibility, and access management controls. Watch now to learn more.
Posted: 04 Mar 2020 | Premiered: Mar 4, 2020

Ionic Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info