IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed   
Operating System Security Reports
 
Avoid the Breach With Effective Application Security Testing
sponsored by HackerOne
WEBCAST: Security is a top priority for e-commerce giant Shopify. Join Shopify's Vice President of Security Engineering and IT, Andrew Dunbar in this webcast as he discusses best practices for testing and securing your cloud-based web applications. The session will also cover how you can scale application security for high-growth DevOps organizations.
Posted: 04 Jun 2019 | Premiered: Jun 4, 2019

HackerOne

The CISO's Ultimate Guide to Securing Applications
sponsored by Synopsys
WHITE PAPER: In The CISO's Ultimate Guide to Securing Applications, discover the tools and services you need to get your application security program on track.
Posted: 13 May 2019 | Published: 13 May 2019

Synopsys

Managing Non-Microsoft Security Updates
sponsored by Flexera Software
WHITE PAPER: Overlooking patches for vulnerabilities on non-Microsoft software is a great security risk for businesses. Despite the awareness of risk, organizations still struggle to identify, prioritize and deploy such patches. In this white paper, learn how to get the right patch management capabilities in place.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

Flexera Software

Jargon Buster Guide to Container Security
sponsored by ComputerWeekly.com
EGUIDE: The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.
Posted: 19 Feb 2019 | Published: 19 Feb 2019

ComputerWeekly.com

Introducing Security Champions to the DevSecOps Life Cycle
sponsored by Synopsys
WHITE PAPER: Security needs to be run inside an Agile sprint in order to keep the pace of development from slowing down too much. Check out this whitepaper on converting developers into Security Champions – developers with a direct impact on the resiliency and security of their firm's software.
Posted: 09 May 2019 | Published: 31 Dec 2017

Synopsys

Application Security Buyer's Guide
sponsored by Rapid7
WHITE PAPER: What characteristics should you look for in a Dynamic Application Security Testing (DAST) tool to give you greater accuracy and ease of use? Download this buyer's guide for 15 questions to ask yourself and your DAST vendor.
Posted: 04 Apr 2019 | Published: 04 Apr 2019

Rapid7

Agile Development for Application Security Managers
sponsored by Synopsys
WHITE PAPER: Security is an incredibly important, though oftentimes forgotten piece of any Agile process. In this guide, find what tweaks to your Agile process you can make today to improve security and deploy your applications even faster.
Posted: 13 May 2019 | Published: 31 Dec 2017

Synopsys

Why Websites Stay Vulnerable: And What You Can Do About It
sponsored by WhiteHat Security
WEBCAST: There have been a number of data breaches in the news recently due to website vulnerabilities. In order to ensure your business isn't breached, incorporate security into your development process. In this webcast, explore key considerations for securing your web applications.
Posted: 01 Mar 2019 | Premiered: Mar 1, 2019

WhiteHat Security

Secure DevOps: Fact or Fiction?
sponsored by Veracode, Inc.
ANALYST BRIEF: It's important to build security into your DevOps process. This is easier said than done, but take a look through this DevOps security guide to uncover how to shift security left, who should be responsible for security, and how to quickly improve the quality of the applications you are developing.
Posted: 20 May 2019 | Published: 31 Oct 2018

Veracode, Inc.

Blue Prism Transforms Security from Reactive to Proactive with Veracode
sponsored by Veracode, Inc.
CASE STUDY: Establishing trust in your product's security is just as important as its overall quality in the eye of the user -- a fact almost all developers are familiar with. That's why many development teams are making a shift from reactive to proactive application security models. Keep reading to find out why, illustrated by a real world story.
Posted: 20 May 2019 | Published: 20 May 2019

Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement