IT Management  >   Systems Design and Development  >   Application Development  >  

SDL

RSS Feed    Add to Google    Add to My Yahoo!
SDL Reports
 
Integrating Security Across the Software Development Lifecycle (SDLC)
sponsored by WhiteHat Security
CASE STUDY: In this white paper, you will learn how to not only identify and remediate web app vulnerabilities, but to integrate security into the software development lifecycle (SDLC). Access now to learn more.
Posted: 01 Oct 2015 | Published: 03 Jan 2014

WhiteHat Security

Mobile Security Threats: Get Ready for 2016
sponsored by CloudMine
WHITE PAPER: This valuable resource will help your organization to bolster your mobile security defenses as you race to adopt new technologies to stay ever-more innovative and agile. View now to discover 6 top mobile security threats, as well as 8 best practices for securing your enterprise mobile apps.
Posted: 16 Oct 2015 | Published: 16 Oct 2015


Securing Apps from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 01 Oct 2015 | Published: 28 Oct 2014

WhiteHat Security

The Essential Guide for Threat Intelligence Services: What to Look For
sponsored by SearchSecurity.com
EBOOK: Vendors are now turning to threat intelligence services to combat unseen threats. This guide will introduce you to threat intelligence services and detail how each services compares to one another. Learn how to best choose a service that can fight the specific attacks which afflict your network and who can scale as your organization grows.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

SearchSecurity.com

As Attackers Target Application Coding Errors, Are Static Analysis Tools the Answer?
sponsored by Programming Research
EGUIDE: This expert e-guide discusses the pros and cons of static code analysis tools for application security. Inside, discover the 5 most common and insidious threats to application security and gain access to expert articles on how to counter them.
Posted: 10 Mar 2016 | Published: 07 Mar 2016

Programming Research

How IoT Is Making Security Imperative for All Embedded Software
sponsored by Programming Research
WHITE PAPER: This white paper explores the unique challenges of securing embedded applications and explains how to overcome these obstacles with static code analysis tools. Discover how you can identify and eliminate defects earlier on in the development cycle.
Posted: 10 Mar 2016 | Published: 10 Mar 2016

Programming Research

Addressing Security Vulnerabilities in Embedded Applications
sponsored by Programming Research
WHITE PAPER: This resource explains why it's so difficult to produce secure embedded software and provides best practices for embedded developers. Discover how you can minimize exploitable software vulnerabilities, cut costs, and speed up development with automated static analysis.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

Programming Research

2012 Cost of Cyber Crime Study: UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors.
Posted: 25 Oct 2012 | Published: 25 Oct 2012

ComputerWeekly.com

E-Book: Technical Guide on Application Security: Secure Development
sponsored by IBM
EBOOK: When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

IBM

10 Tips for Mobile Application Security
sponsored by Dell SecureWorks
WHITE PAPER: While the rapid growth of mobility has enabled increased customer satisfaction, operational efficiencies, employee productivity and more; it has also introduced a number of new security challenges. In this paper, uncover 10 must-know tips for deploying secure mobile applications to help you leverage mobility while keeping the bad guys out.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

Dell SecureWorks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
SDL White Papers | SDL Multimedia | SDL IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement