IT Management  >   Systems Operations  >   Security  >  

Software Security

RSS Feed   
Software Security Reports
 
RiskScore Index Report
sponsored by Contrast Security
WHITE PAPER: Read this Report to learn about the Contrast Risk Score algorithm, its initial use on different vulnerability types and how to get involved when it is released as an open-source project.
Posted: 13 Apr 2021 | Published: 13 Apr 2021

Contrast Security

Using digital twins to cut costs and improve safety at Shell
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.
Posted: 09 Nov 2020 | Published: 10 Nov 2020

ComputerWeekly.com

Secure, Cloud-Controlled Network to Enable Work From Home
sponsored by Cradlepoint
WHITE PAPER: When organizations plan for employees to work remote, they must consider both security and bandwidth, and uncover ways for these two to be compromised or effortlessly seamed together. Which route does your department choose to go? Do you have plans for edge computing? Browse this solution brief to learn more about modernizing your network.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

Cradlepoint

API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4
sponsored by Traceable
WEBCAST: Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.
Posted: 17 Feb 2021 | Premiered: May 20, 2020

Traceable

Understand the OWASP Top 10 & How WAFs Can Mitigate Them
sponsored by Radware
EBOOK: Since 2003, the Open Web Application Security Project (OWASP) has put together a list of the top 10 security vulnerabilities posing the biggest risk to organizations. Access this e-book to see the current list and discover how web application firewalls (WAFs) can manage these vulnerabilities head-on.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Radware

Reduce API Security Risks with Automated and Continuous API Scanning
sponsored by WhiteHat Security
WEBCAST: Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent history. How do we reduce API security risks? View this webcast to learn why testing may be the key.
Posted: 20 Nov 2020 | Premiered: Jul 15, 2020

WhiteHat Security

THE DEVSECOPS GUIDE TO MANAGING OPEN-SOURCE RISK
sponsored by Contrast Security
WHITE PAPER: Open this eBook and examine how you can implement automation for tracking open source components in use, identifying risks, and enabling effective mitigation.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Contrast Security

Revealing The Cultural Divide Between Application Security And Development
sponsored by ZeroNorth
WHITE PAPER: The cultural divide between security teams and developers is as old as application development itself. This research report sets out to define the top concerns and demands of each side of this infamous debate, so businesses can understand what steps they should take to help their teams and their application security alike. Download the report here.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

ZeroNorth

Contrast Protect: Runtime Application Protection And Observability
sponsored by Contrast Security
RESOURCE: Contrast Protect is a runtime application protection and observability solution that uses real-time analysis of application runtime events to confirm exploitability before taking action to block an attack. Download this solution brief to learn more about the capabilities and benefits of Contrast Protect.
Posted: 07 Jun 2021 | Published: 07 Jun 2021

Contrast Security

Leading U.S. Car Manufacturer
sponsored by Prosimo
CASE STUDY: A leading U.S. car manufacturer was managing multiple VPN solutions in various locations to connect to a specific European-hosted application for users across 3 continents, leading to disconnections and poor performance abound. View this case study to learn how Prosimo helped this manufacturer improve experience for its distributed workforce.
Posted: 14 Apr 2021 | Published: 14 Apr 2021

Prosimo
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences