AppDetective
By: Application Security, Inc. View more from Application Security, Inc. >>
Download this next:
Who should get the technology vote in the UK General Election?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week’s Computer Weekly, we take an in-depth look at the technology and digital policies in the main political parties’ election manifestos. We examine the rise of alternatives to relational databases that better support a big data environment. And we assess the security issues around container technology.
These are also closely related to: "AppDetective"
-
Web-facing applications: Security assessment tools and strategies
By: TechTarget Security
Type: White Paper
Businesses continue to create web applications that offer improved access to information. Unfortunately, this online presence has created an area that’s vulnerable to security threats and web application security assessments that often fall short.
Consult this expert E-guide to learn more about properly discovering web application threats. Discover the tools you need for protection and how you can mitigate likely threats by consulting this resource now.
-
E-Guide: Database Tools for Auditing and Forensics
By: TechTarget Security
Type: eGuide
Database auditing requires more than just the right tools: those tools also have to be properly configured to offer the information that's needed and database performance that's required.
This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting database performance.
Find more content like what you just read:
-
Proactive Security: Software vulnerability management and beyond
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
-
Computer Weekly 25 August 2020: When algorithms don't play fair
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we report on the auditing of algorithms to countervail bias. We examine what CISOs can learn from Covid-19. And we assess how competent AI is at building applications that deliver the best possible customer experience, in our buyer's guide to modern software development. Read the issue now.
-
Avoiding the Oracle traps and risks with AWS solutions
By: OpsCompass
Type: eBook
Download this e-book to learn how you can identify all the cost traps and risks around Oracle licensing and technologies, and implement best-practices, solutions, and strategies to minimize them in AWS.
-
Empowering your application teams with database as a service (DBaaS)
By: Silk Technologies Inc
Type: eBook
The shift to Database as a Service (DBaaS) marks a significant stride in cloud transformation, offering unmatched scalability, performance, and security for database workloads. Read on to learn how DBaaS can alleviate your in-house teams from the intricacies of database management, empowering them to focus on innovation and strategic initiatives.
-
Enhancing database security with Zero Trust
By: Trustwave
Type: White Paper
Browse this white paper to discover why and how to apply Zero Trust to your business’s database security.
-
Vulnerability assessment in 2024: Compare leading vendors
By: CrowdStrike
Type: Gartner Research Report
As you evaluate the vulnerability assessment (VA) landscape, the thoughts and experiences of other customers – your peers – can be a valuable resource. To supply you with that resource, Gartner developed the 2024 “Voice of the Customer for Vulnerability Assessment” report. Dig in to unlock the insights in full.
-
How to choose a database for your mobile apps
By: Couchbase
Type: White Paper
Consumers rely on mobile applications, even when there is no internet connection. To help you provide the always-on experience customers demand, database solutions like Couchbase Mobile have added synchronization and offline capabilities to their mobile database offerings. This white paper helps you choose the best mobile database for your needs.
-
What to do when a zero-day attack strikes
By: Palo Alto Networks
Type: Webcast
Picture this: A known vulnerability has been discovered in your network, but there is no known exploit code. You are now facing a race against time to remediate this emerging threat before it does considerable damage. Watch this webinar to see how a security expert assesses this troubling situation and remediates a zero-day exploit live in action.
-
CW APAC: Trend Watch: Database technology
By: TechTarget ComputerWeekly.com
Type: Ezine
In this handbook, focused on database technology in the Asia-Pacific region, Computer Weekly looks at the impact of graph databases and the different types of database management systems currently on the market.
-
Royal Holloway: Securing connected and autonomous vehicles
By: TechTarget ComputerWeekly.com
Type: Research Content
This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
-
Infographic: Comparing cloud database security
By: TechTarget ComputerWeekly.com
Type: Infographic
More data than ever before is being put into cloud-based storage repositories. Leading cloud providers offer an array of storage options, yet databases remain the most common choice in today's enterprises. Because databases are updated so frequently, it's important to review their security controls regularly.
-
Why NoSQL for AI-powered applications: An architectural guide
By: Couchbase
Type: White Paper
NoSQL databases are built to be flexible, scalable, and capable of rapidly responding to the data management demands of modern businesses, which means they can serve as the basis for AI applications that need ultimate adaptability now and into the future. Read this architectural guide now to learn more.
-
Jargon buster guide to database management
By: TechTarget ComputerWeekly.com
Type: eGuide
This Jargon Buster e-guide to contemporary database management is an aid to stepping back and thinking afresh about an area of enterprise IT that has many decades of heritage. Or, as many sometimes (arguably rudely) put it, legacy.
-
Inside the successful projects that rely on NoSQL database applications
By: Couchbase
Type: White Paper
Check out this white paper for a look inside the modern challenges that NoSQL databases address, as well as when to choose NoSQL over relational and why.
-
10 common NoSQL use cases for modern applications
By: Couchbase
Type: White Paper
With businesses racing to build hyper-personalized customer experiences powered by generative AI, Couchbase announces vector search at the edge, enabling AI-powered mobile applications. Read on to learn about the 10 most common NoSQL use cases from customers using the Couchbase high performing database platform.
-
Taking stock of database technologies
By: TechTarget ComputerWeekly.com
Type: eGuide
Database technologies have evolved over decades, from relational databases to NoSQL databases that make it easier to store & handle data in the cloud. In this e-guide, how organisations are addressing database management challenges & how Alibaba is using cloud-native databases to reduce downtime in its annual Singles' Day sales.
-
Infographic: Advantages and disadvantages of key-value databases
By: TechTarget ComputerWeekly.com
Type: Infographic
Different database types exist to serve different purposes. This sometimes makes the choice of the right type of database to use obvious. While key-value databases may be limited in what they can do, they are often the right choice for many different situations. Here are the main advantages and disadvantages of key-value databases.
-
Couchbase in an AI-first world
By: Couchbase
Type: Analyst Report
Couchbase announced CapellaIQ, generative AI (GenAI) capabilities, into its database-as-a-service (DBaaS) product Couchbase Capella. The new capability enables developers to write SQL++ and generate sample data and application-level code more quickly by offering recommendations.
-
Aligning Ransomware Protection and Recovery Plans with Critical Capabilities
By: Commvault
Type: White Paper
A multi-layered security framework is important for data security because it helps to provide several defenses to cover data security gaps that may exist within your infrastructure. Download this e-book to learn how to improve your data security and align internal teams for better ransomware protection.
-
Ransomware readiness assessments: 101 guide
By: Portnox
Type: Blog
In the face of increasingly sophisticated ransomware attacks, many businesses are working to bolster their defenses. One step your organization can take toward accomplishing that goal is to leverage a ransomware readiness assessment. For a 101 guide to such assessments, explore this blog post.
-
Computer Weekly - 21 December 2021: What is Log4Shell - and why the panic?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we assess the risks from Log4Shell, a new web software vulnerability described as "catastrophic". We look at SASE – secure access service edge – which is set to be one of the networking priorities for 2022. And some victims of the Post Office IT scandal are still waiting for proper compensation. Read the issue now.
-
CrowdStrike Falcon Exposure Management demo video
By: CrowdStrike
Type: Video
Within seconds of configuring a policy in CrowdStrike’s Falcon Exposure Management, though, the security configuration assessment illuminates both assets and rules with the most failures across your organization—thereby increasing auditing efficiency. Watch this compact demo to see how Falcon’s assessment works.
-
How CM.com improved their application security
By: Contrast Security
Type: Case Study
CM.com has become a global leader in cloud software for conversational commerce that enables businesses to deliver a customized customer experience. By partnering with Contrast Security, CM.com were able to overhaul their application security. Read on to learn more.
-
Demystifying the myths of public cloud computing
By: TechTarget ComputerWeekly.com
Type: Research Content
In this article in our Royal Holloway security series, Chris Hodson asks whether public cloud is less secure than private datacentres, and assesses service models, deployment, threats and good practice.
-
Computer Weekly – 14 November 2023: The UK AI Safety Summit – what did it achieve?
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.
-
4 reasons to consider cloud database migration
By: AllCloud
Type: Blog
When it comes to cloud database migrations, it can be hard to weigh the many benefits of a migration with its various drawbacks. This web post helps you consider this important decision by exploring the top 4 reasons behind cloud database migrations. Check it out to explore some key factors behind why organizations move their DBs to the cloud.
-
Graph database: Enable real-time decisions at scale
By: Aerospike
Type: White Paper
Organizations today are turning to multi-model, multi-cloud databases that can be effective and efficient when dealing with different scenarios. Read on to learn about such a database and discover how you can leverage it to make real-time decisions at scale.
-
How to achieve better database performance and consolidate your data center
By: Dell
Type: Infographic
Discover in this detail-packed infographic how your organization can boost Oracle Database performance by moving from older servers to 16th Generation Dell PowerEdge R960 servers with Intel Xeon Scalable processors.
-
Oracle - Autonomous computing that declines a special name
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, follow Oracle's twin paths to adding AI and delivering software over the cloud – on its own platform and infrastructure as a service, from 2017 to 2018. An over-arching theme of Oracle's case regarding its infusion of machine learning and its declared re-architecting of its cloud delivery has been security, security, security.
-
Compliance Field Guide: Reducing Costs in an Increasingly Regulated World
By: Symantec Corporation
Type: White Paper
This in-depth white paper offers 6 compliance and audit best practices to help you address today's complex compliance environment. Click through for a leading integrated solution that manages policies, standards, response assessments, and vulnerabilities.
-
OWASP Top Ten: How to keep up
By: Contrast Security
Type: eBook
The newest addition to the OWASP Top Ten was recently published to help organizations assess their application security efforts – but false positives could lead to unnecessary stress. Download now to learn how Contrast’s observability platforms is designed to keep up with the rapidly expanding scope of the OWASP Top Ten.
-
A Computer Weekly buyer's guide to graph databases
By: TechTarget ComputerWeekly.com
Type: eBook
In this 14-page buyer's guide, Computer Weekly looks at the technology that teases out connections between divergent datasets – and how it is revolutionising data analysis.
-
IT in Europe E-Zine – The Cloud Issue
By: TechTarget Data Center
Type: eBook
There is enormous competitive advantage to be gained by organisations that understand how to take advantage of the opportunities for innovation that the cloud represents. In this month's IT in Europe, we aim to help point you in the right direction.
-
Computer Weekly – 25 July 2023: Getting comfortable with data
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, we talk to the head of IT at furniture retailer DFS about building trust in data. The vulnerabilities in MOVEit software continue to attract new victims – we assess the impact of the breaches. And we find out how online investigators are trawling social media to gather evidence of war crimes. Read the issue now.
-
DevSecOps: A comprehensive guide
By: Contrast Security
Type: eGuide
Read this DevSecOps Buyer’s Guide and get the comprehensive checklist you need to assess, vet, and purchase a DevSecOps platform that delivers accurate, continuous, and integrated security monitoring and remediation.
-
Thorough network assessments: An example
By: Reply
Type: Case Study
In this e-book, discover an example of a thorough network assessment by Net Reply that examines a company’s data center, cloud connectivity and more.
-
Market guide for attack surface management for 2024 & beyond
By: Palo Alto Networks
Type: Analyst Report
Access this report to learn about key vendors for attack surface management, as well as ASM's functions such as asset discovery and risk scoring, noting the importance of integrating ASM with other security tools for a robust defense.
-
Virtualization for Dummies eBook
By: TechTarget Data Center
Type: eBook
Integrating cloud apps with in-house legacy apps can be a challenge but with the emergence of SaaS integration tools, it's now easier than ever for organizations to do it themselves. Access this eBook to learn how to assess how cloud apps will integrate into your current environment, must know key terms related to cloud app integration and more.
-
How to achieve container security best practice
By: TechTarget ComputerWeekly.com
Type: eGuide
In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.
-
How to achieve container security best practice
By: TechTarget ComputerWeekly.com
Type: eGuide
In a recent series of articles, Computer Weekly's long-running Security Think Tank assessed some of the issues around this tricky problem and sought to answer the question, what do CISOs need to know to secure containers? In this e-guide, we will explore some of their thoughts.
-
e-Guide: Evolving IT security threats: Inside Web-based, social engineering attacks
By: TechTarget Security
Type: eGuide
Defending IT infrastructure involves understanding attack methods that are effective today. This expert e-guide highlights several characteristics of modern computer security threats to keep in mind as you assess and improve your information security program, and provides recommendations for dealing with them.
-
Securing the complex, distributed enterprise
By: Hewlett Packard Enterprise
Type: White Paper
As edge expansion, the Internet of Things (IoT), distributed (remote) workforces, and more continue to generate and consume more data, companies are put at risk of that information being siloed and compromised. Browse this white paper to learn the best ways you can keep up with the digital transformation.
-
Modernizing the Mainframe: Preserve IT Investments, Manage Risk
By: Ensono Limited
Type: White Paper
Fragmented data, exceeded budget, data risk—these are 3 challenges common to mainframe modernization. To avoid these challenges and facilitate a smooth transformation, many organizations utilize a tool or service. One such service is Application Migration Methodology (AMM). Read this white paper to understand AMM’s 5 steps.
-
Bitdefender Pen Testing: 6 benefits for web, mobile, & networks
By: Bitdefender
Type: Product Overview
Bitdefender Offensive Services go beyond vulnerability assessment by identifying key security weaknesses so they can be remediated, in addition to customized Penetration (Pen) Testing. Find out how your company could benefit from employing Bitdefender Offensive Services by downloading this solution overview
-
A Computer Weekly buyer's guide to NoSQL
By: TechTarget ComputerWeekly.com
Type: eBook
There's a lot of data out there, much of which doesn't need to be stored in heavyweight relational databases complete with complex query languages. In this 13-page buyer's guide, Computer Weekly looks at a new category of NoSQL data stores and how they are being used.
-
Buyer’s guide to API solutions
By: F5 Inc.
Type: Research Content
This guide outlines key considerations for securing APIs. Discover the API ecosystem, map dependencies, and implement runtime protection. Read now to learn how to evaluate API security solutions.
-
Oracle cloud applications exhibit pragmatic adoption curve
By: TechTarget ComputerWeekly.com
Type: eGuide
Oracle prides itself on the full suite of the business applications it offers in the cloud, arguably ahead of its closest rival, SAP – which has prioritised building on its in-memory database Hana over the cloud per se, though its S/4 Hana ERP system is increasingly delivered over the cloud, too.