IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Application Development

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Development Lifecycle, SDL, Developing Secure Applications, Coding Vulnerabilities, Secure Software Development, Secure Programming, Security-related Design
DEFINITION: Ability to maintain security across the application development lifecycle.
Secure Application Development Reports
1 - 25 of 83 Matches Previous Page  |  Next Page
Machine Learning in Cyber Security
sponsored by Recorded Future
WHITE PAPER: AI systems are helping security operations centers function quicker and assess problems faster. Read this white paper to discover how your security posture can benefit from predictive analytics and threat intelligence.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Recorded Future

TIBCO Mashery Security Overview
sponsored by TIBCO Software Inc.
WHITE PAPER: Examine the Mashery API management platform and how it helps to secure apps and sensitive data throughout the entire software development lifecycle. Learn how to improve security for APIs, development, and operations as well as ensure secure, continuous delivery and development continuity.
Posted: 16 Aug 2017 | Published: 22 Sep 2015

TIBCO Software Inc.

Hybrid Active Directory Security and Governance
sponsored by Quest
WHITE PAPER: Discover how to know in real time when suspicious activities occur in the cloud and on your Microsoft Active Directory by improving your security posture.
Posted: 16 Aug 2017 | Published: 31 Dec 2016

Quest

Strengthen Your Defenses Against Cybercrime
sponsored by Mimecast
WHITE PAPER: Despite the fact that email-borne attacks are a real threat, many organizations aren't confident in their ability to spot or stop one. Read this whitepaper to discover how build a cybersecurity plan that will enhance your email security.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Mimecast

Hybrid Active Directory Security Detection and Alerting
sponsored by Quest
EBOOK: Changes to Active Directory are being made daily without your knowledge. Read this e-book to uncover how to suspect inappropriate changes and take action to protect yourself.
Posted: 15 Aug 2017 | Published: 15 Aug 2017

Quest

Effectively Balancing DevSecOps
sponsored by Flux7
WHITE PAPER: As app development becomes more agile, security can get left in the dust – and conversely, if security and testing takes too long, it can decelerate the app lifecycle and impede organizational agility. Learn how to enables DevSecOps with security automation for AWS and cloud-based development environments.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

Flux7

From Agile Development to DevOps to DevSecOps
sponsored by Veracode, Inc.
VIDEO: It seems like organizations are still being breached left and right by cyber threats. Watch this short video to learn about a security platform that will protect your application layer by providing an end-to-end platform, cloud-based scalability, and strategic support to make application security a top priority.
Posted: 04 Aug 2017 | Premiered: 04 Aug 2017

Veracode, Inc.

Mobile Application Security: Discovering Leaks and Remediation
sponsored by WhiteHat Security
WEBCAST: 25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.
Posted: 27 Jul 2017 | Premiered: Jul 27, 2017

WhiteHat Security

Sleeping with the Enemy: Achieving Agility and Security with DevSecOps
sponsored by WhiteHat Security
WEBCAST: To address the faster release demands of Agile, explore DevSecOps and how it effectively improves the collaboration between development, security, and operations teams. Learn how to strive towards continuous security, integrate app security tools, address the growing role of infrastructure as code, and more.
Posted: 26 Jul 2017 | Premiered: Jun 28, 2017

WhiteHat Security

Secure Coding Practices: Avoid SQL Injection
sponsored by WhiteHat Security
WEBCAST: SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.
Posted: 26 Jul 2017 | Premiered: Dec 31, 2016

WhiteHat Security

How To Securely Configure A Linux Host To Run Containers
sponsored by Twistlock, Inc.
WHITE PAPER: Discover how to update traditional security for containerized, microservices-based app development by learning how to securely configure a Linux host to run Docker containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


The Proactive Security Paradigm: How Containers Can Revamp Your Approach To Security
sponsored by Twistlock, Inc.
WHITE PAPER: Learn how to integrate security into DevOps with a container-first security platform that creates more secure microservices-based app development environments and uncover 6 often overlooked security benefits of containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


Secure Agile Development: Why Can't We All Get Along?
sponsored by Veracode, Inc.
WEBCAST: As developers turn to Agile methodologies to accelerate development, app security can often get left in the dust. This webcast explores strategies for increasing collaboration between development and security teams. Learn how to bring security testing up to speed to ensure software quality in Agile development environments.
Posted: 05 May 2017 | Premiered: May 5, 2017

Veracode, Inc.

Coordinating Sec, Dev, and Ops: Improving App Security for Agile Methodologies
sponsored by Veracode, Inc.
WEBCAST: This webcast explores how to update app security and improve software quality by integrating security into the app development process from beginning to end. Find out how to unite security teams with both Dev and Ops by leveraging strategies for building trust between the different teams and fostering collaboration.
Posted: 05 May 2017 | Premiered: May 5, 2017

Veracode, Inc.

Secure DevOps Survival Guide
sponsored by Veracode, Inc.
WHITE PAPER: If you're embarking on a DevOps journey, traditional methods for ensuring app security just won't be able to keep up. This DevOps survival guide explores the elements of accelerated but secure app development. No matter where you are in your journey, uncover critical tactics for implementing secure DevOps.
Posted: 04 May 2017 | Published: 04 May 2017

Veracode, Inc.

Secure Apps at the Speed of DevOps
sponsored by Veracode, Inc.
RESEARCH CONTENT: This Forrester Research report explores the importance of uniting security pros with Dev and Ops to deliver on accelerated secure app development. Uncover the report's key findings to learn how to build security into earlier stages of the app lifecycle to remediate vulnerabilities without sacrificing speed.
Posted: 04 May 2017 | Published: 16 Dec 2016

Veracode, Inc.

Free Download: CISSP Certification Strategic Guide
sponsored by TechTarget
RESOURCE: For security professionals, CISSP certification is globally recognized as a standard of achievement which is why we partnered with (ISC)2 to create CISSP Certification: A step-by-step strategic guide. Fill out this short survey to receive immediate access to this resource and one step closer certification.
Posted: 03 May 2017 | Published: 18 Apr 2014

TechTarget

How to Automate Security into Your DevOps Pipeline
sponsored by Veracode, Inc.
WHITE PAPER: Manual penetration testing and on-premise tools help prevent breaches, but they're too slow for an increasingly fast-paced, mobile-first world. Discover how to accelerate time-to-market without sacrificing app compliance by integrating security into your existing toolchains and DevOps pipelines.
Posted: 01 May 2017 | Published: 01 May 2017

Veracode, Inc.

DevSecOps: Putting the Security in DevOps
sponsored by Sonatype
EGUIDE: Security in DevOps, aptly named DevSecOps, is something that your development organization is going to have to deal with soon. This e-guide is your primer to bringing these two departments together when they come from such different perspectives. Learn how to improve collaboration, incorporate security earlier in development, and more.
Posted: 08 May 2017 | Published: 04 May 2017

Sonatype

Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

IBM

Application Security: Evaluate Leading Testing Vendors
sponsored by IBM
WHITE PAPER: This Gartner resource compares 19 leading application security testing solution vendors, revealing the strengths and weaknesses of each one. View now and discover how the vendors performed in areas like product quality, sales execution and pricing, and customer experience.
Posted: 11 Mar 2016 | Published: 06 Aug 2015

IBM

Transforming Cloud Datacenter Security for Business Mobility
sponsored by vmware airwatch
WHITE PAPER: In this white paper, you'll learn ways to secure proprietary applications and data in the cloud data center. Learn what these cloud security approaches can offer over traditional security methods.
Posted: 18 Sep 2015 | Published: 18 Sep 2015

vmware airwatch

Support and Secure Mobile Devices with Enterprise Cloud Management
sponsored by vmware airwatch
WHITE PAPER: This white paper is designed to help organizations securely leverage Office 365 on their mobile devices. Discover how to secure all company apps both cloud and on-premise.
Posted: 18 Sep 2015 | Published: 31 Jan 2014

vmware airwatch

Empower More Productive Users with EMM and Enterprise Mobility
sponsored by vmware airwatch
RESOURCE: This infographic will review how current mobility trends (like the expansion of cloud architecture) are affecting EMM. Discover how cloud-enabled EMM can power the productivity of your users and IT, as well as 5 reasons to employ advanced EMM.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

vmware airwatch

Become a Technology Partner with Citrix and Expand Your Business Reach
sponsored by Citrix Ready
WEBCAST: This webinar describes how Citrix Ready showcases verified products that are trusted to enhance Citrix solutions for mobility, virtualization, networking, and cloud platforms. Plus you learn why becoming a technology partner with Citrix will expand your business reach and bottom line.
Posted: 09 Sep 2015 | Premiered: Nov 3, 2015

Citrix Ready
1 - 25 of 83 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement