IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Software Development

RSS Feed    Add to Google    Add to My Yahoo!
Secure Software Development Reports
 
Addressing Security Vulnerabilities in Embedded Applications
sponsored by Programming Research
WHITE PAPER: This resource explains why it's so difficult to produce secure embedded software and provides best practices for embedded developers. Discover how you can minimize exploitable software vulnerabilities, cut costs, and speed up development with automated static analysis.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

Programming Research

5 Steps to Achieve Risk-based Application Security Management
sponsored by IBM
WHITE PAPER: This e-guide discusses potential obstacles to managing application security effectively and describes 5 steps for implementing risk-based application security management. Access now and obtain visibility into the state of application security across your enterprise with these tips.
Posted: 29 Jan 2016 | Published: 31 Jul 2015

IBM

Integrating Security Across the Software Development Lifecycle (SDLC)
sponsored by WhiteHat Security
CASE STUDY: In this white paper, you will learn how to not only identify and remediate web app vulnerabilities, but to integrate security into the software development lifecycle (SDLC). Access now to learn more.
Posted: 01 Oct 2015 | Published: 03 Jan 2014

WhiteHat Security

Secure at the Source: Implementing Source Code Vulnerability Testing in the Software Development Life Cycle
sponsored by Ounce Labs, an IBM Company
WHITE PAPER: Learn the best models for integrating source code vulnerability testing into the software testing development life-cycle (SDLC) and how to best merge security expertise with development resources.
Posted: 20 Jul 2006 | Published: 19 Jul 2006

Ounce Labs, an IBM Company

Podcast: End-to-End Secure Client to Cloud Access
sponsored by Intel
PODCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

Application Security Advice: Stop Threats before They Start
sponsored by SearchSoftwareQuality.com
EBOOK: Too often, application developers treat security as an afterthought, and they believe last-minute security testing will be enough to safeguard their applications from threats. Consult this expert handbook to learn how to build in security at every stage of the application lifecycle.
Posted: 20 May 2014 | Published: 20 May 2014

SearchSoftwareQuality.com

Using Cyclomatic Path Analysis to Detect Security Vulnerabilities
sponsored by McCabe Software, Inc.
WHITE PAPER: The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

McCabe Software, Inc.

Enterprise Mobility Management Security: How to Score Vendor Fulfillment
sponsored by VMware
WHITE PAPER: This white paper offers the specifics of network connection and BYOD policies, coverage of enterprise-issued mobile devices, and managed security as fulfilled by these vendors.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

VMware

Mobile Security Solutions: Securing & Leveraging Mobile Devices
sponsored by Entrust, Inc.
WHITE PAPER: This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.
Posted: 23 Jul 2012 | Published: 23 Jul 2012

Entrust, Inc.

The Ten Must Haves for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER: Businesses are changing their traditions as employees continue to adopt mobile phone practices. Enterprise mobility may be efficient, but it can also put important company data at risk. Learn more about how you can have secure mobile device management with this valuable resource.
Posted: 01 Aug 2012 | Published: 01 Aug 2012

Zenprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement