IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed   
Operating System Security Reports
 
2020 Application Security Observability Report
sponsored by Contrast Security
WHITE PAPER: Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.
Posted: 21 Sep 2020 | Published: 13 Jul 2020

Contrast Security

Securing Business Critical Apps in the Age of Digital Transformation
sponsored by CyberArk Software, Inc
WHITE PAPER: Digital transformation has had a dramatic impact on application security – highlighting a distinct gap between perceived security effectiveness and the harsh reality. Read this white paper to learn more about this inverse relationship and discover 5 ways to secure your organization’s business critical applications.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

CyberArk Software, Inc

Bringing an End to Security Roadblocks
sponsored by Contrast Security
EBOOK: From a developer’s perspective, legacy tools create delays at every turn. Luckily, this guide proposes a simple solution: security instrumentation. Learn how security instrumentation builds security monitoring and response into the application itself for continuous insight—and no bottlenecks. Read more here.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Contrast Security

Real World SD-WAN from MTM Technologies + CISCO (NYC Story)
sponsored by MTM Technologies
VIDEO: If you’re part of an organization with a goal of digitally transforming their network architecture, capabilities and security, then it may be worth educating yourself on the paradigm-shifting SD-WAN.In this video, learn how a company with global design, manufacturing and retail locations was able to optimize their network operations with SD-WAN.
Posted: 14 Jul 2020 | Premiered: 29 Apr 2020

MTM Technologies

Contrast DevOps-Native AppSec Platform
sponsored by Contrast Security
DATA SHEET: Open-source components have created an entirely new playing field for vulnerabilities and cyberattacks. Security strategies must incorporate security instrumentation to strengthen AppSec platforms and properly accommodate for these new security demands. Learn about the Contrast Security Platform and its 3 components in this guide.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Contrast Security

Business Continuity: What Have We Learned So Far?
sponsored by Akamai Technologies
WEBCAST: Organizations have asked their employees to work remote, and they’ve done their best to scale digital transformation as a result. These changes have supported workforce productivity requirements, but they’ve also created an expanded attack surface and unforeseen complexity. Watch this webcast to learn how organizations can adapt to the new normal.
Posted: 04 Aug 2020 | Premiered: Aug 4, 2020

Akamai Technologies

Help Developers Understand and Use the OWASP Top Ten
sponsored by IANS Research
WHITE PAPER: Each year, the Open Web Application Security Project (OWASP) publishes Top Ten list of common and critical web application security risks. This white paper provides an overview of the Top Ten, why it matters, and best practices for incorporating it into your workday. Read on to get started.
Posted: 11 Jun 2020 | Published: 11 Jun 2020

IANS Research

CIO Trends #11: Benelux
sponsored by ComputerWeekly.com
EGUIDE: The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

ComputerWeekly.com

Product Video: Kona Site Defender
sponsored by Akamai Technologies
VIDEO: New applications and APIs are constantly being introduced, and existing ones are changing. Therefore, protection must be flexible and scalable so that it’s less challenging to pivot. You may be able to benefit with fully customizable protection that uses automation to inspect traffic and defend API endpoints. Watch this video for more details.
Posted: 13 Aug 2020 | Premiered: 13 Aug 2020

Akamai Technologies

Secure Cloud Computing: Today's Biggest Roadblocks
sponsored by TierPoint MSFT
RESOURCE: Now that the COVID-19 pandemic has pushed most office workers to home-based computers outside of corporate firewalls, there’s more reason for hackers to target the cloud. This article explores today’s biggest cloud security risk areas and how to overcome them – read on to get started.
Posted: 31 Aug 2020 | Published: 19 May 2020

TierPoint MSFT
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info