IT Management  >   Systems Operations  >   Security  >  

Software Security

RSS Feed   
Software Security Reports
 
Securing Your Wherever Whenever Workforce
sponsored by Forcepoint
EBOOK: Currently, 87% of organizations rely on employee access to business apps from personal devices. While BYOD trend allows for unhindered agility and collaboration, it also invites additional security risks. In this e-book, uncover the truth about cloud security, and learn how to optimize your mobile-cloud security strategy.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Forcepoint

A DevSecOps Guide
sponsored by Aqua Security
WHITE PAPER: After understanding the value of a DevOps mindset, making the cultural shift and reaping the benefits, many companies are aiming for the next big step: integrating development, operations, and security into one organization. In this white paper, learn how to successfully implement DevSecOps in your organization.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Aqua Security

Auditing Your Company’s Use of Open Source
sponsored by Fossa
WHITE PAPER: As more and more companies continue to include open source as part of their software program, it’s critical to establish a strategy to manage consumption and ensure efficient use of resources. Download this guide for the key aspects of an open source strategy designed to keep you on track with your operational and compliance objectives.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Fossa

Jargon Buster Guide to Container Security
sponsored by ComputerWeekly.com
EGUIDE: The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

ComputerWeekly.com

Protect Critical SAP Transactions and Address Business Risks
sponsored by Appsian
DATA SHEET: Learn how to effectively address the risks associated with ERP business transitions using Appsian Security Platform.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Appsian

Unbreakable API: Best Practices for AppSec Testing
sponsored by WhiteHat Security
WEBCAST: Modern API development is creating more and more entry points in an application’s architecture for cyberattacks. In this WhiteHat webinar, chief scientist Eric Sheridan goes through some best practices for APIs, including industry perspectives, AppSec breakdowns, and more. Get up to date with your API security strategy. Watch the webinar now.
Posted: 14 Jan 2020 | Premiered: Jan 14, 2020

WhiteHat Security

Core - DNS - Employees Like to Use Unsanctioned Apps - and Don’t Plan to Stop
sponsored by Cisco Umbrella
WHITE PAPER: It’s an unfortunate truth that employees are going to download unsanctioned apps. While these apps may boost productivity, they also expose your network to risk. Don’t wait for threats to strike – download this white paper and discover a new approach to network security that means no more playing defense.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Cisco Umbrella

2019 Application Security Statistics Report: The DevSecOps Approach
sponsored by WhiteHat Security
WHITE PAPER: Despite the growing emphasis IT teams place on application security, too many enterprises still fall prone to risks as a result of legacy procedures, lack of coordination, and negligence. Download this application security report for a wide range of takeaways from survey IT teams, and 4 recommendations to leverage in your own DevSecOps.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

WhiteHat Security

The Secure DevOps Imperative: 3 Best Practices for Securing Cloud Applications
sponsored by Trend Micro
WHITE PAPER: The rapid adoption of cloud technologies has required a unified development and deployment approach with increased involvement of the cybersecurity team. Given the amount of sensitive data residing in cloud applications, incorporating security is critical. Download this white paper to unlock 3 best practices for securing cloud native applications.
Posted: 26 Feb 2020 | Published: 30 Nov 2019

Trend Micro

Is Having Too Many Apps Expanding your Threat Surface?
sponsored by F5 Networks
WHITE PAPER: According to a recent IDG study, the average company has 1,742 business apps in their environment – making some wonder: Is this too many? How many is too many? What are the risks, if any, of too many applications? Download this white paper to uncover answers to these questions & more.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

F5 Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info