IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed   
Operating System Security Reports
Change Healthcare
sponsored by Micro Focus
CASE STUDY: Applications developed by Change Healthcare are used to process millions of healthcare transactions. Therefore, it is essential for the organization to ensure all data is secure. In this case study, learn how Fortify on Demand and Micro Focus Fortify WebInspect provided an affordable and effective means of finding and fixing vulnerabilities.
Posted: 30 Jan 2019 | Published: 31 Aug 2018

Micro Focus

Modular Security in the Age of Automated SecOps
sponsored by Swimlane
WHITE PAPER: SecOps teams are frequently inundated with inefficient, manual tasks, which leave them with limited resources to implement incident response processes. In this e-book, learn how SecOps can use automation and orchestration to help solve these issues.
Posted: 10 Oct 2018 | Published: 10 Oct 2018


Securing Every App isn't a Pipe Dream
sponsored by F5 Networks
WHITE PAPER: This white paper takes a look at how network operations and security are changing to keep modern apps protected. Learn about the BIG-IP Cloud Edition and find out what make-or-break factors to look for in the tools in you app delivery pipeline so you can ensure sound app security, availability, and performance.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

SANS Product Review Webinar
sponsored by WhiteSource
WEBCAST: Whitesource's open source security solution helps automate the finding of vulnerabilities and open source components and then bridges the gap between development and security professionals. In this webcast, Serge Borso will share his experiences working with Whitesource over the last couple of months.
Posted: 14 Jan 2019 | Premiered: Oct 3, 2018


Jargon Buster Guide to Container Security
sponsored by
EGUIDE: The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.
Posted: 19 Feb 2019 | Published: 19 Feb 2019

Application Security that Follows the Application
sponsored by F5 Networks
RESOURCE: Download this guide to learn how your application team can achieve greater flexibility and speed while security operations teams enforce consistent security policies across the entire application portfolio.
Posted: 23 Jan 2019 | Published: 23 Jan 2019

F5 Networks

GE Digital Case Study
sponsored by WhiteSource
CASE STUDY: Breaches of security in the industrial space can have very real-world consequences, increasing the need for GE Digital to implement strong security practices to reduce the risk of exploitable vulnerabilities in their applications. In this case study, find out how GE used WhiteSource to do so.
Posted: 08 Feb 2019 | Published: 08 Feb 2019


Increase Visibility to Boost Security
sponsored by F5 Networks
WHITE PAPER: The increase of SSL/TLS traffic indicates that organizations are focused on protecting the data that flows through their Internet-facing apps. However, the growth of malware hidden within that encrypted traffic is cause for concern. In this white paper, see how F5 Networks' SSL/TLS orchestration tool can help keep your organization secure.
Posted: 18 Feb 2019 | Published: 30 Sep 2018

F5 Networks

Defending Against Encrypted Threats
sponsored by F5 Networks
WHITE PAPER: While Transport Layer Security improves security for web traffic, it comes at a price—increased workload demand and the potential hazards of malware cloaked in encrypted traffic. In this white paper, learn how F5 SSL Orchestrator can help your business drive insight into encrypted traffic.
Posted: 15 Feb 2019 | Published: 30 Sep 2018

F5 Networks

SC Magazine - 5 Things Every CISO Needs To Know About OS Security
sponsored by WhiteSource
VIDEO: Discover 5 approaches and best practices that security teams and CISOs should implement in order to enable developers to harness the power of open source, without slowing down productivity or compromising security.
Posted: 14 Jan 2019 | Premiered: 20 Mar 2018


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement