IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed   
Operating System Security Reports
Orchestration of App-Driven Security Policies
sponsored by Silver Peak
WEBCAST: Take a look at this webcast to discover how to orchestrate security policies within applications.
Posted: 11 Dec 2017 | Premiered: Dec 11, 2017

Silver Peak

2017 Application Security Statistics Report
sponsored by WhiteHat Security
RESOURCE: According to the Verizon 2017 DBIR, 30% of total breaches reported involved attacks on web applications. This 60-page application security statistics report provides perspective on the present application security posture of hundreds of organizations, so that enterprises like yours can understand and improve their own security.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

WhiteHat Security

Deploying Your API Infrastructure: Cloud, On-Premises or Both?
sponsored by CA Technologies
WHITE PAPER: Find out how to approach API management from a usage model perspective, and learn about an end-to-end API management platform that offers secure cloud, on-premise, and hybrid deployment options.
Posted: 08 Dec 2017 | Published: 31 Dec 2016

CA Technologies

The State of Security for In-Production Web Applications
sponsored by tCell
WHITE PAPER: In both the 2016 and 2017 Verizon Data Breach Investigations Reports, web application attacks are listed as the number one breach method, by far. Explore this white paper to gain insight into specific web app attacks, including third-party libraries, account takeovers, and more.
Posted: 22 Dec 2017 | Published: 22 Dec 2017


Castles in the Cloud: Security and Compliance for Office 365
sponsored by Proofpoint, Inc.
EBOOK: Email makes it easy for attackers to exploit the "human factor" of security and steal credentials, data and more. In fact, 91% of targeted attacks target people, according to Proofpoint. This e-book offers strategies for enhancing your Office 365 security posture by improving compliance and threat detection techniques.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Proofpoint, Inc.

Microservices vs. Service-Oriented Architecture
sponsored by NGINX
WHITE PAPER: Both microservices architecture and SOA are considered service-based architectures with shared characteristics, but very different architecture styles. This 50+ page e-book compares the two architectures to enable you to make the best choice to meet your organization's unique needs.
Posted: 11 Jan 2018 | Published: 11 Jan 2018


Contextual Access to Apps and Data Anywhere Anytime on Any Device
sponsored by Citrix
WEBCAST: This webcast offers a strategic approach to securing access to apps and data on any desktop or device.
Posted: 05 Feb 2018 | Premiered: Feb 5, 2018


The State of Software Security: Developer Guide
sponsored by Veracode, Inc.
WHITE PAPER: This State of Software Security report examines the increased burden on developers to ensure sound app security testing, particularly in DevOps and Agile environments. Discover best practices to improve app security testing and remediation, and learn about the tenets of DevSecOps.
Posted: 12 Jan 2018 | Published: 31 Dec 2017

Veracode, Inc.

Filling the Gaps in Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper provides information from an Osterman Research survey regarding users' experience with Office 365 security.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Proofpoint, Inc.

Trusted Access For Painless Security
sponsored by Duo Security
RESOURCE: Learn how to help reduce risk of a data breach caused by compromised credentials, known vulnerabilities, or exploits and how to verify your users' identity up front through authentication.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Duo Security

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement