IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed   
Operating System Security Reports
 
Third Party Script Application Security: Intrusion vs Detection
sponsored by Akamai Technologies
VIDEO: Emerging tactics among credit card skimming attacks are underlying the need to fortify security to stay ahead of these increasingly devastating campaigns. This 20-minute video provides a brief history of Magecart attacks and the rise of third-party scripts. Watch now to learn more about these threats and better understand how to mitigate them.
Posted: 31 Jul 2020 | Premiered: 31 Jul 2020

Akamai Technologies

Cloud-ready ADC: Simplify management of your complex environment
sponsored by Citrix
RESOURCE: Traditional app delivery solutions help ensure availability, performance, and security, but not all solutions can bridge the gap between modern and legacy application environments. Download this white paper to learn about a cloud-ready application delivery controller that helps to simplify complex environments and adapt to changing needs.
Posted: 07 May 2020 | Published: 07 May 2020

Citrix

Endpoint Defense: Security Controls to Consider Now
sponsored by TechTarget
RESOURCE: The total cost of a successful attack is over $5 million, according to Ponemon Institute's 2017 State of Endpoint Security Risk Report. Simply complete our Endpoint Security Survey to access our complimentary expert guide, Endpoint Defense: Security Controls to Consider Now.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget

Tata Communications’ Secure Web Gateway
sponsored by TATA Communications
VIDEO: As applications, infrastructures and data continue to move to the cloud, ensuring users have appropriate and reliable access – regardless of location – is critical. In this short video, discover how Tata Communications’ Secure Web Gateway enables users with enhanced visibility and security.
Posted: 30 Jul 2020 | Premiered: 15 Aug 2018

TATA Communications

What’s Wrong With DAST
sponsored by Wallarm
WHITE PAPER: Most security organizations use vulnerability scanners and other DAST tools. However, most of the scanners that are deployed today are limited in their coverage. In this white paper, learn about 3 important areas a scanner must address when conducting scans to ensure full coverage.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

Wallarm

State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: In today’s business environment, almost every application includes open source libraries that enable productive and scalable functionality. In this research report, explore an in-depth analysis of the results from a Veracode study into the current state of open source application security.
Posted: 11 Jun 2020 | Published: 11 Jun 2020

Veracode, Inc.

Contrast Assess Route Intelligence
sponsored by Contrast Security
DATA SHEET: Learn how Contrast Assess Route Intelligence transforms AppSec by observing the routes of an application while it’s running—thereby exposing all the different points of entry into the application.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

Contrast Security

12 Reasons Why You Need Stronger Mobile App Security
sponsored by NowSecure
RESOURCE: Whether it’s for internal communication, enhancing customer experience or part of a digital transformation initiative, mobile applications play a critical role and ensuring their protection is paramount. Download this infographic to discover 12 reasons why organizations need stronger mobile app security strategies.
Posted: 22 Jun 2020 | Published: 22 Jun 2020

NowSecure

THE IMITATION GAME
sponsored by F5 Networks
RESOURCE: IT executives, contributors, and IT security teams in a range of industries understand that their growing arrays of public-facing applications, whether those are web, mobile, or API-based, are the targets of automated bot attack campaigns.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

F5 Networks

The Maturity of Zero Trust in Europe
sponsored by Okta
RESOURCE: While only 18% of organizations in Europe have a defined strategy along Zero Trust principles, 93% of European organizations polled had implemented at least one security solution that mapped to a Zero Trust strategy. How does your organization compare regarding Zero Trust? View this infographic to learn how Europe is enhancing security.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info