Standards  >   Security Standards  >  

WS-Security

RSS Feed   
DEFINITION: WS-Security (Web Services Security) is a proposed IT industry standard that addresses security when data is exchanged as part of a Web service. WS-Security is one of a series of specifications from an industry group that includes IBM, Microsoft, and Verisign. Related specifications include the Business Process Execution Language (BPEL), WS-Coordination, and WS-Transaction. WS-Security specifies enhancements  … 

WS-Security definition sponsored by SearchMicroservices.com, powered by WhatIs.com an online computer dictionary
WS-Security Reports
1 - 25 of 564 Matches Previous Page  |  Next Page
10 Endpoint Security Problems and How the Cloud Solves Them
sponsored by VMware International Unlimited Company
WHITE PAPER: In today’s world of increasingly frequent and complex threats, the responsibility of protecting endpoints can no longer be left to traditional security tactics. In this whitepaper, discover why & how organizations are embracing cloud-based endpoint security platforms.
Posted: 18 May 2020 | Published: 18 May 2020

VMware International Unlimited Company

10 Ways to Secure and Accelerate a Modern Workforce
sponsored by Cloudflare
EBOOK: As organizations become increasingly dependent on remote users (employees, partners and contractors), protecting remote users and managing access becomes a critical part of an organization’s success. Read this e-book to uncover 10 best practices for ensuring remote access security without compromising productivity.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

Cloudflare

13 Email Threat Types to Know about Right Now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

2019 Cloud Trends Report
sponsored by Skybox Security
WHITE PAPER: As organizations continue to embrace the benefits of cloud technologies, they must also be mindful of the additional threats and vulnerabilities that can occur as a result of their transformation. In this report, analyze key trends and challenges related to cloud tools, infrastructures and security across 2019.
Posted: 28 Apr 2020 | Published: 28 Apr 2020

Skybox Security

2019 CrowdStrike Global Security Attitude Survey
sponsored by CrowdStrike
WHITE PAPER: Each year, CrowdStrike conducts a Global Security Attitude Survey to better understand the current state of incident detection and response. The industry ideal is set at the 1-10-60 rule: 1 minute to detect, 10 minutes to understand, and 60 minutes to contain. Read the research results and see how close organizations came to this benchmark.
Posted: 14 May 2020 | Published: 14 May 2020

CrowdStrike

2020 Cloud Misconfigurations Report
sponsored by DivvyCloud
WHITE PAPER: Across 2018 and 2019, data breaches caused by cloud misconfiguration resulted in the exposure of over 33 billion records, which led to a loss of nearly $5 trillion. In this report, explore the underlying causes of this threat and discover best practices for avoiding a misconfiguration-related incident.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

DivvyCloud

2020 Cyber Hygiene Report
sponsored by Automox
WHITE PAPER: Cyber hygiene, as defined by the Center for Internet Security, is a set of practices designed for proactively protecting organizations from threats. This report contains the findings from recent study into the overall cyber hygiene benefits and challenges across several organizations. Read on to see how you stack up to your peers.
Posted: 10 Apr 2020 | Published: 10 Apr 2020


2020 Cybersecurity Outlook Report
sponsored by VMware International Unlimited Company
WHITE PAPER: The fight between organizations trying to secure their data and cyberattackers looking for ways to steal it is a constant struggle that seems to constantly evolve. As organizations employ stronger defenses, hackers find more creative ways to bypass them. In this research report, uncover the findings from a study into the evolution of this pattern.
Posted: 01 May 2020 | Published: 01 May 2020

VMware International Unlimited Company

2020 Cybersecurity Trends: Consolidation, Cloud, and Convergence
sponsored by Cisco Umbrella
EBOOK: As today’s workforce becomes increasingly distributed, organizations need to consider network access that goes beyond the data center. In this e-book, see where the security landscape is heading, identify the gaps in today’s security tactics, and highlight the steps you can take to protect your organization, today and tomorrow.
Posted: 19 May 2020 | Published: 19 May 2020

Cisco Umbrella

2020 Global Threat Report
sponsored by CrowdStrike
WHITE PAPER: Each year, the CrowdStrike Intelligence team releases a report of their findings from looking into cyberattack trends and emerging adversaries over the previous year. This year’s report examines key trends in ransomware and eCrime as well as an overview of state-sponsored adversaries and their suspected motives.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

CrowdStrike

2020 State of Enterprise Cloud Adoption and Security
sponsored by DivvyCloud
WHITE PAPER: Cloud usage has been growing steadily over recent years, and that trend is expected to continue. However, misconfigurations and data breaches have led to security concerns. This report highlights the findings from a 2019 study into enterprise cloud adoption as well as security and compliance challenges. Read on to uncover the results.
Posted: 22 Apr 2020 | Published: 22 Apr 2020

DivvyCloud

2020 State of Malware Report
sponsored by Malwarebytes
WHITE PAPER: Each year, cybercriminals come up with more creative ways to infect organizations, devices and users in order to cause disruptions. In this 2020 State of Malware Report, take a closer look at some of the key attack trends in 2019 and see how the threat landscape has evolved over the last decade.
Posted: 14 Apr 2020 | Published: 29 Feb 2020

Malwarebytes

2020 Vulnerability and Threat Trends
sponsored by Skybox Security
WHITE PAPER: Enterprise growth is a double-edged sword – the more complex and distributed a business environment becomes, the larger the attack surface becomes. In this report, explore vulnerability and threat trends across 2020, including emerging threat vectors, disruptive attack methods, vulnerable operating systems, and more.
Posted: 28 Apr 2020 | Published: 28 Apr 2020

Skybox Security

3 Easy Steps to Implement Cloud-Based Identity and Access Management (IAM)
sponsored by OneLogin
WHITE PAPER: Discover 3 simple steps that are designed to help you craft a digitally transformative identity and access management (IAM) strategy and address the demands of cloud security.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

OneLogin

3 Steps to Secure Remote Workers and Students
sponsored by Cisco Umbrella
VIDEO: As remote access appears to become the new norm for students, workers and medical patients, ensuring the security of the users and their devices is critical. In this webinar, join Meg Diaz, head of cloud security marketing at Cisco, as they offer their expertise for securing remote workers and students.
Posted: 05 May 2020 | Premiered: 30 Mar 2020

Cisco Umbrella

4 Actions to Secure Work from Home Employees
sponsored by Ping Identity Corporation
WEBCAST: Current events have led to a sudden and dramatic shift towards remote workers and devices. Even though identity and access management has been a trend in cybersecurity for some time, the massive shift towards working from home has made this paramount. In this webinar, discover 4 actions you can take to secure remote workers.
Posted: 02 Apr 2020 | Premiered: Apr 2, 2020

Ping Identity Corporation

5 Myths About Identity Governance
sponsored by SailPoint Technologies
WHITE PAPER: As IT environments grow more distributed and cyberattacks become more complex, organizations have begun to embrace identity governance to combat these threats. However, there are a lot of misconceptions surrounding this approach. This white paper clears the air by examining the top 5 identity governance myths.
Posted: 15 Apr 2020 | Published: 15 Apr 2020

SailPoint Technologies

5 Ways to Boost Agility by Transforming Workforce Identity
sponsored by Ping Identity Corporation
RESOURCE: Workforce identity management enables security teams to monitor and control which users and devices have access to specific areas of data. In this article, discover how this approach to data management can help organizations boost agility and enhance security.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Ping Identity Corporation

6 Key Use Cases for Securing Your Organization’s Cloud Workloads
sponsored by Cyber-Ark Software
CASE STUDY: In order to ensure organizations are transitioning to the cloud responsibly, security programs need to be implemented that address the unique challenges each organization faces. In this collection of use cases, discover how 6 organizations overcame various cloud security challenges to ensure their data was protected.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Cyber-Ark Software

7 Ways to Take Cybersecurity to New Levels
sponsored by Cisco Umbrella
WHITE PAPER: Contrary to popular belief, more security tools don’t always mean better security. As business environments grow more complex, it’s critical for security to have a holistic, unified approach. Read this white paper to discover 7 ways organizations can enhance their security stack with cloud security, without sacrificing customization and control.
Posted: 21 May 2020 | Published: 21 May 2020

Cisco Umbrella

A Comprehensive Guide to Authentication Technologies and Methods
sponsored by Thales
WHITE PAPER: Given the number of vectors being targeted by hackers, organizations are opting for a variety of focused tools based on need rather than an all-in-one approach to protect their digital identities. Read this comprehensive guide to learn more about the key methods and challenges surrounding authentication.
Posted: 28 Apr 2020 | Published: 31 Mar 2020

Thales

A Comprehensive Guide to Securing Data with Database Encryption
sponsored by Thales
WHITE PAPER: Today’s IT security teams are faced with an increasing demand for database encryption but managing this growing challenge can be difficult. In this white paper, discover the key approaches for addressing this uptick in encryption demand and familiarize yourself with Thales’ data protection portfolio.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

Thales

A Guide to Verifying Users for Marketplaces
sponsored by Vonage
WHITE PAPER: Online shopping has completely changed the way organizations interact with their customers. However, these marketplaces make attractive targets for fraudsters and cybercriminals. In this guide, discover a frictionless method for verifying your users: phone verification with two-factor authentication.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Vonage

7 Elements of Cybersecurity Readiness
sponsored by Cisco Umbrella and Dimension Data
EGUIDE: Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.
Posted: 29 Mar 2017 | Published: 20 Mar 2017

Cisco Umbrella and Dimension Data

A Case for IT Security: The Future of New EU Data Protection
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com
1 - 25 of 564 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info