IT Management  >   Systems Design and Development  >   Application Development  >  

Coding Vulnerabilities

RSS Feed    Add to Google    Add to My Yahoo!
Coding VulnerabilitiesWhite Papers (View All Report Types)
 
Breaking down silos of protection: An integrated approach to managing application security
sponsored by IBM
WHITE PAPER: This resource explores the critical risks created by application growth, why point products are unable to offer adequate protection, and the value of taking an integrated approach to managing application security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

Integrating Security into Development, No Pain Required
sponsored by IBM
WHITE PAPER: There are substantial security benefits to developers and security personnel working together, yet they are often viewed as being like oil and water. In this paper, discover how to integrate software development and security effectively and pain-free by using the right tools and techniques.
Posted: 24 Apr 2012 | Published: 24 Apr 2012

IBM

Mobile Security Solutions: Securing & Leveraging Mobile Devices
sponsored by Entrust, Inc.
WHITE PAPER: This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.
Posted: 23 Jul 2012 | Published: 23 Jul 2012

Entrust, Inc.

Protecting Your Applications from Backdoors: How Static Binary Analysis Helps Build High-Assurance Applications
sponsored by Veracode, Inc.
WHITE PAPER: Backdoors pose operational risk to software that is too significant for organizations to ignore. Binary-level application testing (also called compiled-code analysis) makes it possible to examine the entire application in its final “as delivered” form. Read this white paper to learn more about protecting applications from backdoor vulnerabilities.
Posted: 10 May 2010 | Published: 10 May 2010

Veracode, Inc.

Blog: DevOps for the mainframe
sponsored by IBM
WHITE PAPER: Learn the basics of DevOps and important information you need to know in order to create a successful strategy.
Posted: 18 Oct 2013 | Published: 18 Apr 2013

IBM

Five Steps to Secure Outsourced Application Development
sponsored by Veracode, Inc.
WHITE PAPER: Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development.
Posted: 10 May 2010 | Published: 10 May 2010

Veracode, Inc.

Metrics That Matter: Quantifying Software Security Risk
sponsored by Fortify Software
WHITE PAPER: Software security presents new measurement challenges: there are no established formulas for quantifying the security risk present in an application. This paper provides a set of metrics for ensuring an accurate view of software projects.
Posted: 07 May 2007 | Published: 01 Jan 2006

Fortify Software

The Ten Must Haves for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER: Businesses are changing their traditions as employees continue to adopt mobile phone practices. Enterprise mobility may be efficient, but it can also put important company data at risk. Learn more about how you can have secure mobile device management with this valuable resource.
Posted: 01 Aug 2012 | Published: 01 Aug 2012

Zenprise

State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Veracode, Inc.

Secure at the Source: Implementing Source Code Vulnerability Testing in the Software Development Life Cycle
sponsored by Ounce Labs, an IBM Company
WHITE PAPER: Learn the best models for integrating source code vulnerability testing into the software testing development life-cycle (SDLC) and how to best merge security expertise with development resources.
Posted: 20 Jul 2006 | Published: 19 Jul 2006

Ounce Labs, an IBM Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement