Operating System Security Reports

CIO Trends #11: Benelux
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.
Posted: 08 Feb 2021 | Published: 02 Jul 2020

TechTarget ComputerWeekly.com

Infographic: 2019 Europe IT Priorities - Datacentre
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic, we take a look at what technological elements of the datacentre are expected to be the most important in 2019, the most popular datacentre projects and which technologies and services are being deployed. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.
Posted: 08 Feb 2021 | Published: 23 Apr 2019

TechTarget ComputerWeekly.com

Infographic: How blockchain works
sponsored by TechTarget ComputerWeekly.com
EGUIDE: To get a solid understanding of how to use blockchain in an enterprise setting, CIOs must first grasp how a unit of value in a transaction moves from party A to party B. This infographic details how blockchain works from transaction initiation, through verification, all the way to delivery.
Posted: 08 Feb 2021 | Published: 17 Sep 2019

TechTarget ComputerWeekly.com

Why DevOps + Security = A Bright Idea
sponsored by TechTarget Security
EBOOK: By combining DevOps and security, software developers will be able to produce more secure applications and infrastructures and defeat the long-standing bias that security is an obstacle, not aid, to good software development.
Posted: 22 Nov 2016 | Published: 18 Nov 2016

TechTarget Security

IoT Poses New Problems for Developers
sponsored by TheServerSide.com
EBOOK: This expert handbook addresses three major issues posed by the IoT: security, analytics, and application testing. Uncover key insights on how to overcome these challenges and deliver secure, trustworthy, and valuable IoT devices.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

TheServerSide.com

Jargon Buster Guide to Container Security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

TechTarget ComputerWeekly.com

The Evolution of ADC
sponsored by Citrix
EGUIDE: Explore the companies that offer the broadest selection of ADC features, and learn about the evolution of ADCs as demands have changed.
Posted: 23 May 2018 | Published: 22 May 2018

Citrix

VMs vs. containers: Which is better for security?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

TechTarget ComputerWeekly.com

What to Look for in Next-Generation Firewalls
sponsored by TechTarget Security
EBOOK: This Buyer's Guide goes in-depth on the process of selecting the best next-generation firewall for your company and how to ensure your organization has a clear understanding of its security requirements in the modern threat landscape.
Posted: 09 Jun 2016 | Published: 06 Jun 2016

TechTarget Security

Mobile App Q&A: Mobile Expert Talks Security and Testing
sponsored by InfoStretch
EGUIDE: This e-guide provides an in-depth question & answer session with mobile application lifecycle management expert Manish Mathuria about the biggest problems around mobile app security. Access critical advice on how to design your mobile app security testing process to catch issues before they lead to a breach you can't afford.
Posted: 05 Feb 2016 | Published: 28 Jan 2016

InfoStretch