IT Management  >   Systems Operations  >   Security  >  

Operating System Security

RSS Feed   
Operating System Security Reports
 
DevSecOps Framework – Technical Deep Dive
sponsored by WhiteHat Security
WEBCAST: Organizational infrastructure is becoming more and more vulnerable, and as a result, development teams are searching for ways to securely develop, build and deploy business-driving applications. So, what can these teams do to get started? They can begin by watching this webcast to learn the keys to a successful DevSecOps implementation.
Posted: 16 Nov 2020 | Premiered: Nov 16, 2020

WhiteHat Security

2020 Election Security
sponsored by WhiteHat Security
WHITE PAPER: Around the globe, we’ve witnessed how cybercriminals can create chaos during election cycles by disqualifying legitimate voters, corrupting voter data and launching denial-of-service attacks. In recent years, U.S. elections have come under continuous assault. See this white paper to learn about the security challenges this causes for the country.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

WhiteHat Security

OAuth and OpenID Connect - What's Next?
sponsored by Curity AB
WEBCAST: The OAuth 2.0 framework has provided identity professionals open standards for authenticating users, but the world is now mobile, and the way apps are being built is changing. OpenID Connect by Curity is an identity layer on top of the current OAuth protocol that is API-ready for a remote workforce. Watch this webcast to see why this matters now.
Posted: 19 Jan 2021 | Premiered: Jan 19, 2021

Curity AB

Mistakes to Love: A Survey of Identity Mistakes
sponsored by Auth0
WHITE PAPER: For leading application development teams, there seems to be debate around buying vs building. The following report provides in-depth insights from a survey into the successes and failures of identity professionals across their identity projects – both bought and build. Read on to unlock the key findings.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Auth0

5 Powerful Solutions for Scaling Application Security
sponsored by ZeroNorth
WHITE PAPER: Inside this State of Application Security report, find the most up-to-date findings, discover the 5 most powerful solutions for scaling application security, and explore how the infamously rocky relationship between development and security managed throughout 2020. Download the report here.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

ZeroNorth

Addressing Complexity and Expertise in Application Security Testing
sponsored by WhiteHat Security
RESEARCH CONTENT: The Verizon’s 2020 DBIR indicated that 43% of data breaches begin by targeting a web application. This discovery has begun to shift the cybersecurity paradigm from focusing on on-premise infrastructures to protecting their web apps with application security testing (AST). Read this 451 Research brief to learn more about AST.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

WhiteHat Security

JumpStart Guide to Application Security in AWS
sponsored by Fortinet, Inc.
VIDEO: Deploying and securing critical business applications in cloud environments is becoming a standard practice for today’s IT and security driven organizations. In this webinar, join security experts from SANS, Fortinet and AWS as they discuss how to deploy and security applications in AWS environments – watch now for exclusive insight.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Fortinet, Inc.

How Manual Application Vulnerability Management Delays Innovation and Increases Business Risk
sponsored by Contrast Security
EBOOK: More often than not, development and security teams are at odds. In fact, as many as 52% of companies admit to cutting back on security measures in order to meet business demands, according to Contrast Security. In this report, learn how organizations can approach security with fewer frustrations and more collaboration between teams.
Posted: 27 Aug 2020 | Published: 27 Aug 2020

Contrast Security

Secure SD-WAN: A Comprehensive Guide
sponsored by Fortinet, Inc.
WHITE PAPER: With the rapid rise in SaaS and IaaS use, many network engineering and operations leaders are looking to replace their outdated WAN infrastructures with SD-WAN. While selecting the right SD-WAN for a particular use case may require a few compromises, security shouldn’t be one of them. Access this guide to learn about secure SD-WAN.
Posted: 29 Oct 2020 | Published: 03 Oct 2019

Fortinet, Inc.

Automating TLS provisioning with OpenShift Service Mesh
sponsored by Red Hat
VIDEO: Traditional application servers are being replaced by modern application microservices architectures that enable distributed workforces to collaborate. This webinar highlights the importance of using mutual TLS (mTLS) to secure communications between services and overviews some of the nuances about its setup – watch now to get started.
Posted: 21 Jan 2021 | Premiered: 21 Jan 2021

Red Hat
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info