SDL Reports

Your guide to container security: Tips and tricks for success
sponsored by Palo Alto Networks
WEBCAST: To ensure you fully understand the container attack surface and to ward off container security risks, tune into the following webcast. Inside, you’ll takeaway 4 containers and Kubernetes security best practices to immediately apply in your organization.
Posted: 01 May 2024 | Premiered: May 1, 2024

Palo Alto Networks

Four Ways to Increase Developer Buy in of AppSec
sponsored by Veracode, Inc.
WHITE PAPER: PH
Posted: 26 Jan 2022 | Published: 26 Jan 2022

Veracode, Inc.

A Computer Weekly e-guide to SASE
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
Posted: 12 Nov 2021 | Published: 12 Nov 2021

TechTarget ComputerWeekly.com

The Ten Must Haves for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER: Businesses are changing their traditions as employees continue to adopt mobile phone practices. Enterprise mobility may be efficient, but it can also put important company data at risk. Learn more about how you can have secure mobile device management with this valuable resource.
Posted: 01 Aug 2012 | Published: 01 Aug 2012

Zenprise

How to Secure Your Microsoft SharePoint Products
sponsored by Thawte Inc.
EGUIDE: This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order.
Posted: 22 May 2013 | Published: 22 May 2013

Thawte Inc.

Webcast: How Security is well suited for Agile development
sponsored by IBM
WEBCAST: View this webcast as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and how security is linked to the software development lifecycle.
Posted: 15 Jun 2011 | Premiered: Jun 15, 2011

IBM

WAN Optimization: Expert Guidelines to Management and Security
sponsored by TechTarget Networking
EBOOK: What is the next step for WAN management? This expert guide explains why WAN optimization is now the norm and provides guidelines for an all-in-one strategy to minimize cost, complexity, and risk within your organization.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

TechTarget Networking

E-Guide: Improving software with the building security in maturity model
sponsored by TechTarget Security
EGUIDE: This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.
Posted: 26 May 2011 | Published: 26 May 2011

TechTarget Security

Presentation Transcript: Three Reasons Why Security Fails and What to Do About It
sponsored by Sophos
PRESENTATION TRANSCRIPT: Web security seems to get tougher every year. Dynamic content, user generated content, and social networking increase the complexity of securing hosted web servers. Read this presentation transcript to learn about the latest web threats, which ones to be most concerned with, and what IT pros should do to help prevent them.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

Sophos

The Modern Mobility E-Zine: An Exclusive Look at Enterprise Mobility
sponsored by TechTarget Mobile Computing
EZINE: Access this e-zine to learn how the role of DevOps is changing as enterprise mobility matures. Read on here to see how fusing mobile app development and management can change the way IT delivers mobile information to users.
Posted: 14 Apr 2015 | Published: 13 Apr 2015

TechTarget Mobile Computing