IT Management  >   Systems Design and Development  >   Application Development  >  

Developing Secure Applications

RSS Feed    Add to Google    Add to My Yahoo!
Developing Secure Applications Reports
 
4 Components of a Solid Mobile App Security Strategy
sponsored by IBM
WHITE PAPER: This white paper explains how to design a business-driven app strategy that advances business goals without putting enterprise data and your network at risk.
Posted: 15 Jul 2015 | Published: 08 Jul 2015

IBM

Managing App Sideloading Threats on iOS 2015
sponsored by Lookout
WHITE PAPER: Apple has lowered the risk of downloading malware from its App Stores to near zero. However, companies increasingly rely on enterprise provisioning. This white paper examines the security threats organizations face when attackers continue to abuse enterprise provisioning and use it to sideloan malware on iOS devices.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Lookout

2012 Cost of Cyber Crime Study: UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors.
Posted: 25 Oct 2012 | Published: 25 Oct 2012

ComputerWeekly.com

The Last Frontier: Optimization: of the Workforce
sponsored by Workday
WEBCAST: More often business users are looking for a means by which to integrate financial, human resources, and talent information into one platform. In this webcast, Leighanne Levensaler, VP of Product Strategy at Workday, speaks about the challenges HR professionals face with legacy human resource systems and how they can become the workforce authority.
Posted: 04 Aug 2015 | Premiered: Aug 4, 2015

Workday

3 Can't-Miss Approaches to WAN Optimization
sponsored by SearchEnterpriseWAN.com
EBOOK: Now that WAN optimization is mature, what's the next step for WAN management? This technical guide explains why WAN optimization is now the norm. It also provides sample guidelines for all-in-one solution to minimize cost, complexity, and risk within your organization.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

SearchEnterpriseWAN.com

E-Guide: Improving software with the building security in maturity model
sponsored by SearchSecurity.com
EGUIDE: This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.
Posted: 26 May 2011 | Published: 26 May 2011

SearchSecurity.com

Evaluate: IBM Rational AppScan
sponsored by IBM
TRIAL SOFTWARE: With Web applications exposing more sensitive information to anyone with an Internet connection, new security threats are emerging all of the time. IBM Rational AppScan is a leading application security testing suite designed to help manage vulnerability testing throughout the software development life cycle.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011

IBM

Presentation Transcript: Path to a Secure Application
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

IBM

Beating Web Application Security Threats
sponsored by Thawte Inc.
EBOOK: The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats.
Posted: 18 Mar 2010 | Published: 18 Mar 2010

Thawte Inc.

Protecting Web Applications from Attack and Misuse
sponsored by Citrix
WHITE PAPER: Application-layer attacks against business-critical web applications are the most serious IT security threat facing enterprises today. Read this white paper to learn how to improve web application security for your enterprise.
Posted: 27 Jul 2006 | Published: 01 Jul 2006

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement