IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed   
Operating System Security Reports
 
Computer Weekly – 27 November 2018: Software patching at scale – how to make it work
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

ComputerWeekly.com

Detecting and Preventing Banking Application Fraud
sponsored by SAS
RESOURCE: Preventing application fraud starts with validating the identity of an individual using a digital device. Are they really who they say they are? Download this white paper for analytics-driven methods for validating financial services applications and spotting trouble at all three stages of bust-out fraud schemes.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

SAS

Application Security and Performance
sponsored by IBM Akamai
WHITE PAPER: Web application and distributed denial of service (DDoS) attacks hit enterprises without warning or reason. Download this resource to discover how to protect against DDoS attacks and prevent operational disruption, loss of confidential data, lost user productivity, reputational harm, and more.
Posted: 26 Oct 2018 | Published: 26 Oct 2018

IBM Akamai

Securing Every App isn't a Pipe Dream
sponsored by F5 Networks
WHITE PAPER: This white paper takes a look at how network operations and security are changing to keep modern apps protected. Learn about the BIG-IP Cloud Edition and find out what make-or-break factors to look for in the tools in you app delivery pipeline so you can ensure sound app security, availability, and performance.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

5 Techniques to Protect Against a SQL Injection Attack
sponsored by Alert Logic
EBOOK: SQL Injection, the hacking technique that has caused havoc since first being identified in 1998, is still being used on a regular basis. Download this e-book for 5 preventive techniques to get ahead of cybercriminals and secure your SQL-based apps from injections, today.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Alert Logic

A New Security Strategy that Protects the Organization When Work Is Happening from Anywhere
sponsored by Citrix
RESOURCE CENTER: Discover a new approach to cybersecurity that protects the organization when work is happening anywhere on any mobile device.
Posted: 13 Aug 2018 | Published: 13 Aug 2018

Citrix

Say Hello to the Software-Defined Perimeter (SDP)
sponsored by Zscaler
ANALYST REPORT: ESG predicts that the challenge of using legacy methods will serve as a catalyst for a new user and application-centric approach to secure internal applications – software-defined perimeter (SDP). In this ESG report, explore the rise of software-defined perimeters and its many use cases.
Posted: 10 Oct 2018 | Published: 31 May 2018

Zscaler

Strategies for Securing Highly Scalable Containerized Environments
sponsored by Twistlock, Inc.
WHITE PAPER: In this white paper, find out how your organization can take a new approach to security in a containerized environment.
Posted: 07 Aug 2018 | Published: 07 Aug 2018


Leveraging the Benefits of Cloud Web Application Security
sponsored by Oracle Dyn
RESOURCE CENTER: This custom article examines the recent advances in web app security and explores how you can leverage cloud-based technologies to mitigate the risk to your company's critical assets.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

Oracle Dyn

McAfee Skyhigh Security Cloud for Box
sponsored by McAfee, Inc.
RESEARCH CONTENT: Protect your corporate data and ensure security within your organization by gaining control over data and user activity in Box.
Posted: 05 Jul 2018 | Published: 30 Apr 2018

McAfee, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement