Security-related Design Reports

Your guide to container security: Tips and tricks for success
sponsored by Palo Alto Networks
WEBCAST: To ensure you fully understand the container attack surface and to ward off container security risks, tune into the following webcast. Inside, you’ll takeaway 4 containers and Kubernetes security best practices to immediately apply in your organization.
Posted: 01 May 2024 | Premiered: May 1, 2024

Palo Alto Networks

VMs vs. containers: Which is better for security?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 08 Feb 2021 | Published: 02 Oct 2019

TechTarget ComputerWeekly.com

Computer Weekly buyer's guide to mobile app development
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.
Posted: 08 Feb 2021 | Published: 27 Feb 2018

TechTarget ComputerWeekly.com

Computer Weekly – 13 June 2023: The most influential people in UK technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal the 13th annual UKtech50 list, with this year's most influential person award shared by secretaries of state for science, innovation and technology Michelle Donelan and Chloe Smith. Also, we examine mounting legal challenges faced by the emergence of generative AI tools such as ChatGPT. Read the issue now.
Posted: 12 Jun 2023 | Published: 13 Jun 2023

TechTarget ComputerWeekly.com

A Computer Weekly e-guide to SASE
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
Posted: 12 Nov 2021 | Published: 12 Nov 2021

TechTarget ComputerWeekly.com

Presentation Transcript: Three Reasons Why Security Fails and What to Do About It
sponsored by Sophos
PRESENTATION TRANSCRIPT: Web security seems to get tougher every year. Dynamic content, user generated content, and social networking increase the complexity of securing hosted web servers. Read this presentation transcript to learn about the latest web threats, which ones to be most concerned with, and what IT pros should do to help prevent them.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

Sophos

WAN Optimization: Expert Guidelines to Management and Security
sponsored by TechTarget Networking
EBOOK: What is the next step for WAN management? This expert guide explains why WAN optimization is now the norm and provides guidelines for an all-in-one strategy to minimize cost, complexity, and risk within your organization.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

TechTarget Networking

Presentation Transcript: Optimize Business and IT with New Generation Application Lifecycle
sponsored by SAP Community Network
PRESENTATION TRANSCRIPT: This transcript provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
Posted: 26 Oct 2009 | Published: 26 Oct 2009

SAP Community Network

E-Guide: Improving software with the building security in maturity model
sponsored by TechTarget Security
EGUIDE: This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.
Posted: 26 May 2011 | Published: 26 May 2011

TechTarget Security

Webcast: How Security is well suited for Agile development
sponsored by IBM
WEBCAST: View this webcast as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and how security is linked to the software development lifecycle.
Posted: 15 Jun 2011 | Premiered: Jun 15, 2011

IBM