IT Management  >   Systems Operations  >   Security  >  

Software Security

RSS Feed   
Software Security Reports
 
Application security: best practices and risks
sponsored by ComputerWeekly.com
EGUIDE: Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

ComputerWeekly.com

Product Video: Enterprise Application Access
sponsored by Akamai Technologies
VIDEO: With remote work at an all-time high, it’s critical that only the correct users get access to the right applications at the right time. Now, this can be done without granting a user full access to a network. How? By integrating tools such as MFA, SSO and identity onto one secure access platform. Watch this video to get a closer look.
Posted: 18 Aug 2020 | Premiered: 18 Aug 2020

Akamai Technologies

Equifax Success in Security Transformation
sponsored by Sonatype
CASE STUDY: Access this case study to learn how Equifax achieved a security transformation through Sonatype Nexus Life cycle and Nexus Repository.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Sonatype

Penetration Testing Vendor Selection Checklist
sponsored by Synack
RESOURCE: In today’s IT environment, one of the biggest risks to a corporation’s valuation is a security breach. But how does a security team apply their budget in a way that ensures the applications, websites, and other assets are secure? What requirements are the most important? Use this comprehensive checklist to help you evaluate vendors.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Synack

The Evolution of Application Fraud
sponsored by F5 Networks
RESOURCE: Cyberattacks targeting business applications have been on the rise in recent years – an issue made exponentially more prominent as web applications grew in popularity due to COVID-19 changes. This resource provides an overview of the evolution of application fraud – read on to get started.
Posted: 18 Sep 2020 | Published: 18 Sep 2020

F5 Networks

THE IMITATION GAME
sponsored by F5 Networks
RESOURCE: IT executives, contributors, and IT security teams in a range of industries understand that their growing arrays of public-facing applications, whether those are web, mobile, or API-based, are the targets of automated bot attack campaigns.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

F5 Networks

Bloomberg Industry Group Strengthens Their Software Supply Chain
sponsored by Sonatype
CASE STUDY: One of the most difficult parts of using open source software is having to search for vulnerabilities. But this process can be made easier through the improvement of open source governance. Read this case study to view an example of how Bloomberg Industry Group was able to secure their DevOps operations and pave the way for DevSecOps in doing so.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

Sonatype

Product Video: Web Application Protector
sponsored by Akamai Technologies
VIDEO: Ensuring the security of web applications is becoming increasingly difficult as the usage of these apps continues to expand. Watch this brief video for a closer look at Akamai’s Web Application Protector, designed to provide automated, scalable protection for your web apps against today’s sophisticated threats.
Posted: 18 Aug 2020 | Premiered: 18 Aug 2020

Akamai Technologies

Product Brief: Endpoint Agent
sponsored by Sinefa
WHITE PAPER: Security managers and professionals need endpoint monitoring that allows them to gain actionable insights into end user experience and troubleshoot problems. Most of all, these professionals need visibility over their networks so that they can work to optimize performance. Read this white paper to learn about Sinefa’s Endpoint Agent.
Posted: 24 Sep 2020 | Published: 24 Sep 2020

Sinefa

Simple, Secure Networking with SD-WAN
sponsored by Verizon
WEBCAST: Digital transformation has changed from a ‘down-the-road’ initiative to an action item. With the changing application landscape and increase in cloud connectivity, organizations need to become more adaptable – and fast. View this webcast on how SD-WAN can galvanize transformation by amplifying network performance and security.
Posted: 23 Jul 2020 | Premiered: Jul 23, 2020

Verizon
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info