IT Management  >   Systems Design and Development  >   Application Development  >  

Developing Secure Applications

RSS Feed    Add to Google    Add to My Yahoo!
Developing Secure Applications Reports
 
Securing Your Applications and Protecting Your Systems
sponsored by WhiteCryption
EGUIDE: Access this expert e-guide to explore the pros and cons of replication and erasure coding to help you determine which method of data protection is best for your data center. Also, learn why applications experts say frameworks that enforce secure coding provides a better way for developers to write apps that can withstand attacks.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

WhiteCryption

E-Guide: Integrating security into the ALM lifecycle
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, readers will learn the risks businesses take by not taking security measures seriously and what can be done to help integrate security with application lifecycle management.
Posted: 21 Nov 2011 | Published: 16 Nov 2011

SearchSecurity.com

Secure Agile Development
sponsored by Veracode, Inc.
WHITE PAPER: Access this white paper to learn how to integrate security into the development process.
Posted: 26 Feb 2015 | Published: 03 Nov 2014

Veracode, Inc.

Case Study: App Code Security from the Ground Up
sponsored by Veracode, Inc.
WEBCAST: View this webcast and explore how one major airline secured 300 third-party aps by building security from the code up. Discover the steps they took to close security gaps in the code and how to apply the strategies to your apps.
Posted: 02 Mar 2015 | Premiered: Jul 7, 2014

Veracode, Inc.

Simplifying Security in the Agile SDLC
sponsored by Veracode, Inc.
VIDEO: How do sophisticated software development shops inject secure development into their Agile software development lifecycle? Tune into this webcasts featuring experts Maria Loughlin and Rob Curtis from application security firm Veracode, to find out.
Posted: 27 Feb 2015 | Premiered: 27 Feb 2015

Veracode, Inc.

Building Security into the Agile SDLC
sponsored by Veracode, Inc.
VIDEO: Tune into this webcasts to hear from Paul Roberts of the Security Ledger engage and Veracode's security and development experts Ryan O'Boyle and Pete Chestna as they share their best practices on integrating security into agile development- to rapidly deliver applications without exposing them to critical vulnerabilities.
Posted: 27 Feb 2015 | Premiered: 27 Feb 2015

Veracode, Inc.

E-Book: Technical Guide on Application Security: Secure Development
sponsored by IBM
EBOOK: When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

IBM

Five Steps to Secure Outsourced Application Development
sponsored by Veracode, Inc.
WHITE PAPER: Application security has become a top concern for security professionals striving to control their company’s overall risk profile. Meanwhile, companies are also saving money by outsourcing more and more custom code creation. This white paper outlines five best practices that enterprises can use to secure their outsourced application development.
Posted: 10 May 2010 | Published: 10 May 2010

Veracode, Inc.

Evaluate: IBM Rational AppScan
sponsored by IBM
TRIAL SOFTWARE: With Web applications exposing more sensitive information to anyone with an Internet connection, new security threats are emerging all of the time. IBM Rational AppScan is a leading application security testing suite designed to help manage vulnerability testing throughout the software development life cycle.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011

IBM

End-to-End Secure Client to Cloud Access
sponsored by Intel
WEBCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement