IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Software Development

RSS Feed    Add to Google    Add to My Yahoo!
Secure Software Development Reports
 
2012 Cost of Cyber Crime Study: UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors.
Posted: 25 Oct 2012 | Published: 25 Oct 2012

ComputerWeekly.com

Building Security into the Agile SDLC
sponsored by Veracode, Inc.
VIDEO: Tune into this webcasts to hear from Paul Roberts of the Security Ledger engage and Veracode's security and development experts Ryan O'Boyle and Pete Chestna as they share their best practices on integrating security into agile development- to rapidly deliver applications without exposing them to critical vulnerabilities.
Posted: 27 Feb 2015 | Premiered: 27 Feb 2015

Veracode, Inc.

E-Guide: Expert insights to application security testing and performance
sponsored by SearchSecurity.com
EGUIDE: Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle.
Posted: 11 Nov 2011 | Published: 11 Nov 2011

SearchSecurity.com

Information Security: Insider Edition
sponsored by TechTarget
RESOURCE: Keeping your organization's Web presence safe is a difficult task, especially with recent threats against Web applications. Simply take this 2 min survey and learn how you can help application developers acquire the necessary security tools and training to keep your Web presence protected!
Posted: 18 Apr 2014 | Published: 18 Apr 2014

TechTarget

Seven steps to software security
sponsored by Hewlett-Packard Company
WHITE PAPER: Learn seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Posted: 01 Feb 2015 | Published: 01 Sep 2013

Hewlett-Packard Company

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This resource provides an overview of the application threats that your organization faces and describes which risks you need to prioritize. Also inside, find five practical steps you can take to build security into your development processes.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

IBM

How to Secure Your Microsoft SharePoint Products
sponsored by Thawte Inc.
EGUIDE: This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order.
Posted: 22 May 2013 | Published: 22 May 2013

Thawte Inc.

Veracode eLearning Subscription
sponsored by Veracode, Inc.
TRAINING GUIDE: Veracode’s eLearning contains over 30 hours of secure training content in a web-based training module format. The program is designed specifically for developers and security personnel to meet formal training and competency testing requirements. It also contains a comprehensive knowledgebase on secure software development. Read on to learn more.
Posted: 07 May 2010 | Published: 07 May 2010

Veracode, Inc.

State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Veracode, Inc.

Presentation Transcript: Path to a Secure Application
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement