IT Management  >   Systems Design and Development  >   Application Development  >  

Coding Vulnerabilities

RSS Feed    Add to Google    Add to My Yahoo!
Coding Vulnerabilities Reports
Building a Web Application Security Program
sponsored by Qualys
WHITE PAPER: This white paper details how to build a pragmatic web application security program that provides effective security. View now to review the top 12 web app security weak points.
Posted: 12 Oct 2015 | Published: 09 Mar 2009


Enterprise Mobility Best Practices: MDM, Containerization or Both?
sponsored by VMware, Inc.
WHITE PAPER: This white paper highlights several enterprise mobility management (EMM) use cases and defines the advantages of MDM, containerization, and the layered approach to security that both can provide.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

VMware, Inc.

Survey: Security Spending and Preparedness in the Financial Sector
sponsored by LogRhythm, Inc.
WHITE PAPER: In this report, you'll find the results of a survey that reveals how financial organizations are adapting to new security concerns and how they need to do better.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

LogRhythm, Inc.

Managing App Sideloading Threats on iOS 2015
sponsored by Lookout
WHITE PAPER: This white paper examines the security threats organizations face when attackers continue to abuse enterprise provisioning and use it to sideload malware on iOS devices.
Posted: 26 Jun 2015 | Published: 26 Jun 2015


The 10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This white paper presents 10 key points to consider as you develop your enterprise mobility strategy—from security to BYOD. Unlock the full potential of your mobility, and develop a comprehensive and security-conscious mobility strategy for your organization.
Posted: 28 Oct 2015 | Published: 31 Oct 2014


How to Make Android Work For Your Enterprise
sponsored by IBM
WHITE PAPER: This white paper walks you through how to customize the Android security and management capabilities to your company's mobile strategy.
Posted: 13 Jul 2015 | Published: 13 Jul 2015


E-Guide: Integrating security into the ALM lifecycle
sponsored by
EGUIDE: In this expert e-guide, readers will learn the risks businesses take by not taking security measures seriously and what can be done to help integrate security with application lifecycle management.
Posted: 21 Nov 2011 | Published: 16 Nov 2011

Financial MDM: Bringing Secure BYOD to You
sponsored by IBM
WHITE PAPER: This white paper examines the growth of bring your own device (BYOD) culture in financial services, and outlines the host of security challenges IT finance departments face when implementing MDM. Click through to address your financial mobility concerns with a cloud-based solution.
Posted: 13 Aug 2015 | Published: 31 Dec 2014


UBM Tech Whitepaper: The State of UC: Future Adopters Poised to Rap Benefits via Cloud
sponsored by XO Communications
WHITE PAPER: Companies like yours are successfully addressing communications and collaboration challenges with Unified Communications. According to a new UBM Research Study, 87% of adopters say UC met or exceeded their expectations. Learn what holds others back, and how to overcome those obstacles.
Posted: 23 Sep 2015 | Published: 23 Sep 2015

XO Communications

Podcast: End-to-End Secure Client to Cloud Access
sponsored by Intel
PODCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement