XML Web Services Security Reports

Under new cloud management: What the future holds for AWS
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we take a look at some of the challenges facing AWS in greater detail, while also taking a closer look at what the future might hold for AWS under the charge of its new CEO, and how its customers are choosing to consume its technology in 2021.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TechTarget ComputerWeekly.com

7 best practices for Web3 security risk mitigation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Web3 is a fast-growing, but hotly debated, tech movement. Tech builders and businesses must take a proactive approach to security when evaluating Web3's potential. In this infographic, we point out seven best practices for Web3 risk mitigation to help leaders keep their network safe.
Posted: 10 Aug 2022 | Published: 10 Aug 2022

TechTarget ComputerWeekly.com

SharePoint Security Should Not Be an Afterthought
sponsored by Thawte Inc.
EGUIDE: This expert guide from SearchSecurity.com will help you understand the top security issues facing SharePoint and how to ensure that you are deploying this system securely. Read on to learn more.
Posted: 20 May 2013 | Published: 20 May 2013

Thawte Inc.

Securing Web Services and Service-Oriented Architectures with Oracle Web Services Manager 11g
sponsored by Oracle Corporation
WHITE PAPER: While web services offer extraordinary value to a company, they are not free of challenges – especially when it comes to security and management. Read this white paper to learn how the Oracle Web Services Management (WSM) is equipped with the capabilities to help you tackle web-services-based SOA security and management issues.
Posted: 29 Jun 2012 | Published: 29 Jun 2012

Oracle Corporation

A Manifesto for Cyber Resilience
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, find out what it takes to become cyber resilient in this age of escalating threats.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Symantec Corporation

Minimize your financial institution’s risk with solutions from IBM
sponsored by IBM
WHITE PAPER: Organisations face many challenges as they become more reliant on web technology: web applications are increasingly being targeted, and at the same time, compliance regulations continue to grow in complexity. Learn how to tackle these issues with IBM Rational, a comprehensive solution that provides protection, while helping to ensure compliance.
Posted: 04 Aug 2011 | Published: 04 Aug 2011

IBM

Web Browser Security Features Make Attacks Harder
sponsored by TechTarget Security
EGUIDE: This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

TechTarget Security

Under new cloud management: What the future holds for AWS
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we take a look at some of the challenges facing AWS in greater detail, while also taking a closer look at what the future might hold for AWS under the charge of its new CEO, and how its customers are choosing to consume its technology in 2021.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TechTarget ComputerWeekly.com

Buff Up Your Web Apps
sponsored by TechTarget Security
EZINE: Secure web apps are essential to modern business. Learn what security risks they present and get our experts' advice on how to overcome them.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

TechTarget Security

E-Guide: How to build a toolset to avoid Web 2.0 security issues
sponsored by TechTarget Security
EGUIDE: Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network.
Posted: 17 Sep 2010 | Published: 17 Sep 2010

TechTarget Security