IT Management  >   Systems Operations  >   Security  >  

Software Security

RSS Feed   
Software Security Reports
The Architecture of a Container Intelligence Platform
sponsored by Sysdig
WHITE PAPER: Containers are changing the way we run software, and you need a unified approach for monitoring, security, and forensics in containerized & microservice environments. Read this white paper to learn how an intelligent container platform helps you achieve this, emboldening your container strategy.
Posted: 11 Jan 2018 | Published: 29 Nov 2017


The Security Professional's Role in a DevSecOps World
sponsored by Veracode, Inc.
WHITE PAPER: Learn about the evolving role of security professionals in the world of DevSecOps, and find out where app security fits into the shifting app development paradigms created by DevOps cultural changes.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Veracode, Inc.

Trusted Access For Painless Security
sponsored by Duo Security
RESOURCE: Learn how to help reduce risk of a data breach caused by compromised credentials, known vulnerabilities, or exploits and how to verify your users' identity up front through authentication.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Duo Security

Complete NGINX Cookbook for Advanced Operations
sponsored by NGINX
EBOOK: Just like every recipe requires the right mixture of ingredients, delivering application performance at the levels your end users demand requires the right mix of technologies. Access this comprehensive application platform cookbook to learn how to manage your apps for top performance rates.
Posted: 08 Jan 2018 | Published: 26 May 2017


Application Security Testing Magic Quadrant
sponsored by WhiteHat Security
RESOURCE: Application security testing (AST) is growing faster than any other market. Gartner predicts that by 2019, 80% of application security testing vendors will include software composition analysis in their offerings. This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's AST programs as well as a market overview.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

WhiteHat Security

Castles in the Cloud: Security and Compliance for Office 365
sponsored by Proofpoint, Inc.
EBOOK: Email makes it easy for attackers to exploit the "human factor" of security and steal credentials, data and more. In fact, 91% of targeted attacks target people, according to Proofpoint. This e-book offers strategies for enhancing your Office 365 security posture by improving compliance and threat detection techniques.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Proofpoint, Inc.

The Developers Guide to the DevSecOps Galaxy
sponsored by Veracode, Inc.
WHITE PAPER: Learn about the top app security challenges for DevOps methodologies and find out how to bolster app development with best practices for DevSecOps.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Veracode, Inc.

CPaaS Market: Using CPaaS as a Route to Communication-Rich Applications
sponsored by Vonage
RESOURCE: In this resource, discover how enterprises are quickly becoming software companies to leverage APIs as the building blocks upon which to create their CPaaS platforms.
Posted: 19 Jan 2018 | Published: 14 Dec 2017


Why Websites Stay Vulnerable: And What You Can Do About It
sponsored by WhiteHat Security
VIDEO: Web application attacks represent a major threat to an organization's security posture. According to the Verizon DBIR, 30% of breaches involve web attacks. Take a look at this webinar to learn about vulnerabilities within websites and how you can increase your web application security.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

WhiteHat Security

Getting the Most out of your AppSec Program
sponsored by WhiteHat Security
VIDEO: According to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program.
Posted: 23 Jan 2018 | Premiered: 23 Jan 2018

WhiteHat Security

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement