IT Management  >   Systems Operations  >   Security  >  

Software Security

RSS Feed   
Software Security Reports
 
A New Security Strategy that Protects the Organization When Work Is Happening from Anywhere
sponsored by Citrix
RESOURCE CENTER: Discover a new approach to cybersecurity that protects the organization when work is happening anywhere on any mobile device.
Posted: 13 Aug 2018 | Published: 13 Aug 2018

Citrix

Everything You Need to Know About Getting Application Security Buy-in
sponsored by Veracode, Inc.
WHITE PAPER: Application security impacts multiple groups across the entire organization. Read this paper to learn everything you need to know about getting these groups to buy-in on application security.
Posted: 02 Aug 2018 | Published: 02 Feb 2018

Veracode, Inc.

Application Security and Performance
sponsored by IBM Akamai
WHITE PAPER: Web application and distributed denial of service (DDoS) attacks hit enterprises without warning or reason. Download this resource to discover how to protect against DDoS attacks and prevent operational disruption, loss of confidential data, lost user productivity, reputational harm, and more.
Posted: 26 Oct 2018 | Published: 26 Oct 2018

IBM Akamai

Container Security: 10 Things DevOps Need to Do
sponsored by Aqua Security
WHITE PAPER: In this resource, find out the ten key things DevOps should keep in mind when developing and securing containerized applications to minimize the risk posed by loose vulnerabilities.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Aqua Security

Kubernetes Open-Source Orchestration & Security
sponsored by Aqua Security
RESOURCE: For those who use the open-source capabilities of Kubernetes security, there are 4 types of threats that you should know about. In this resource, explore a discussion of threat models, various security considerations and best practices for optimizing your Kubernetes deployment.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Aqua Security

Build a Strategic Approach to Network and App Security
sponsored by Citrix
RESOURCE: Learn how your organization can securely deliver the apps and data your teams need to be productive.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

Citrix

Secure On- and Off- Premises IT Service Delivery Platforms
sponsored by Hewlett Packard Enterprise
EBOOK: Learn how to protect your most organizationally critical digital assets and their interactions, regardless of location or device. Download this eBook so you can adhere to these security checklists.
Posted: 16 Jul 2018 | Published: 31 Oct 2017

Hewlett Packard Enterprise

Monitoring and Securing Mesos Marathon and Java Applications
sponsored by Sysdig
CASE STUDY: Discover how Quby, a smart energy technology company in Amsterdam, was able to gain complete visibility into the performance and security of their new infrastructure and container applications all from a single point of instrumentation.
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Sysdig

Is Your WAF Keeping Pace With Today's Threats?
sponsored by F5 Networks
WHITE PAPER: Cyberattackers are starting to target the application layer, which if breached allows attackers to access the interfaces that hosts use to communicate and access information sent over a network. Read this white paper to learn how to choose a web app firewall (WAF) that protects your network.
Posted: 26 Sep 2018 | Published: 26 Sep 2018

F5 Networks

DDoS is the New Spam: 3 Strategies to Turn Catastrophe into Annoyance
sponsored by F5 Networks
EBOOK: DDoS isn't going away anytime soon, and as attacks and motivations evolve, so must IT security defenses. Download this e-book for 3 strategies on how to up your DDoS game, today.
Posted: 21 Sep 2018 | Published: 31 Dec 2017

F5 Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement