IT Management  >   Systems Operations  >   Security  >  

Software Security

RSS Feed   
Software Security Reports
 
Latest Cyber Security Strategies in ASEAN
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, find out how organizations in Southeast Asia such as Grab are approaching cyber security, what security companies are doing to stay ahead of hackers and the role of threat intelligence in mitigating cyber threats.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

ComputerWeekly.com

Evolution of Product Testing: Firewall
sponsored by NSS Labs
PRODUCT REVIEW: In this firewall testing report, learn how your organization can benefit from a firewall that is as stable, as reliable, as fast, and as flexible as the network it is protecting.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

NSS Labs

Application security: More important than ever
sponsored by IBM
EGUIDE: In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

IBM

Application Security as a Competitive Advantage
sponsored by Veracode, Inc.
WEBCAST: Application security a critical priority today. Learn how to address application security concerns while also gaining a competitive advantage at the same time in this video.
Posted: 05 Jun 2018 | Premiered: Jun 5, 2018

Veracode, Inc.

Application & Infrastructure Security Controls on the Kinvey Platform
sponsored by Progress Software, Inc.
WHITE PAPER: This white paper describes the security features of a mobile Backend as a Service (mBaaS) platform to help alleviate these security and privacy risks by isolating and protecting enterprise data sources and networks from client applications running on untrusted devices and their networks.
Posted: 29 Jun 2018 | Published: 29 Jun 2018

Progress Software, Inc.

Three Questions to Ask Before you Migrate Apps to the Public Cloud
sponsored by Oracle Dyn
ESSENTIAL GUIDE: Many firms assume public cloud is the best place to host all apps, but that's not always the case. Find out why in this essential guide.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Oracle Dyn

Protecting Microservices and APIs with ABAC, OAuth and OpenID Connect
sponsored by Axiomatics
WHITE PAPER: This resource outlines a set of examples where security standards work together in addressing requirements that are difficult or impossible to meet by using OAuth or OIDC alone. Find out how your organization can combine security capabilities to separate privacy concerns and more.
Posted: 17 Jun 2018 | Published: 15 Jun 2018

Axiomatics

In Defense of Secure, Compliant Information Sharing
sponsored by Axway
RESOURCE: Find out how the Danish Defence selected the API platform that would best fit their needs, and explore the ins and outs of deploying in a secure DMZ.
Posted: 21 May 2018 | Published: 29 Dec 2017

Axway

Automating Security Best Practices on AWS
sponsored by Barracuda
RESOURCE: How can you guarantee the security of your applications? Take a glimpse at the resource to learn how incorporating application security directly into the code building process accelerates your development of web applications with confidence.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

Barracuda

Top 10 API Security Considerations
sponsored by Axway
WHITE PAPER: Learn the top 10 considerations for a security architect who wants to tackle one of today's biggest security challenges – APIs.
Posted: 24 May 2018 | Published: 24 May 2018

Axway
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement