IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed   
Operating System Security Reports
 
Creating A Safe Environment For Under-Protected Apis
sponsored by Radware
WHITE PAPER: Learn how to create a safe environment for your under protected APIs and protect against the most common API attacks with Radware.
Posted: 06 Apr 2021 | Published: 06 Apr 2021

Radware

Next-Generation Firewall Buyer’s Guide
sponsored by Palo Alto Networks
RESOURCE: Cloud adoption, big data analytics, machine learning and automation are all accelerating the delivery of applications, which in and of themselves are becoming increasingly accessible. However, this also means that apps are more vulnerable than ever. Browse this guide to learn how Next-Gen Firewalls can minimize risk without slowing you down.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

ITProTV | CompTIA PenTest+: Analyze Scripts: Python
sponsored by Cornerstone OnDemand
VIDEO: This video will walk you through how to analyze Python scripts for the CompTIA PenTest+: and will explain the foundational knowledge of Python so that you are better equipped to write scripts and analyze and discern the purpose of scripts you come into contact with. Tune in to start your test prep.
Posted: 26 Jun 2020 | Premiered: 26 Jun 2020

Cornerstone OnDemand

The Prosimo SLA Value
sponsored by Prosimo
WHITE PAPER: One of today’s critical business functions is delivering a fast, reliable and secure application experience, but enterprise cloud architects and operations teams have limited observability and control across hybrid and multi-cloud environments. View this white paper to learn how per-application SLAs can mitigate this issue.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

Prosimo

Scaling and Protecting Websites stretched by COVID-19
sponsored by Barracuda
WEBCAST: The COVID-19 crisis is forcing organizations to dramatically accelerate the shift to doing business online. This means you’re suddenly ramping up the web applications that your business depends on. Join this webinar to get advice on how to stay secure while rapidly scaling up capacity.
Posted: 06 May 2020 | Premiered: May 6, 2020

Barracuda

WhiteHat Pen Test Service
sponsored by WhiteHat Security
DATA SHEET: In this guide, learn how to maximize your application security with automated and continuous web application scanning plus periodic pen testing to find and fix crucial vulnerabilities faster. This advanced approach will significantly reduce the risk of data breaches and other cybersecurity incidents. Get the details first-hand here.
Posted: 13 Nov 2020 | Published: 13 Nov 2020

WhiteHat Security

Axis Security Video 1
sponsored by Axis Security
VIDEO: Your private business apps are the beating heart of your organization, but there’s a huge disconnect between these private apps and the people who need to use them. As a result, third-party contractors, employees and others experience delays or are shut out altogether. View this short video to learn about a new approach to private app access.
Posted: 07 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

Ensuring Cloud Security and Compliance in the Financial Services Industry
sponsored by DivvyCloud
WHITE PAPER: In order to meet customer demands, financial service organizations are embracing mobile banking applications. However, teams should be aware of the additional security threats associated with organizational changes. Download this white paper and learn how to ensure cloud security and compliance while embracing digital transformation.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

DivvyCloud

ITProTV | Microsoft AZ 500: Create, Configure, Network, App Security Groups
sponsored by Cornerstone OnDemand
WEBCAST: In this video, learn what Network Security Groups and Application Security Groups are, and explore the 7 steps required to filter network traffic with a network security group using the Azure Portal.
Posted: 25 Jun 2020 | Premiered: Jun 25, 2020

Cornerstone OnDemand

How to Protect Against the OWASP Top 10 and Beyond
sponsored by F5 Networks
RESOURCE: VERACODE NOTED THAT 72% OF ALL APPLICATIONS HAD AT LEAST ONE VULNERABILITY.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

F5 Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences