All resources sponsored by:

Whitehat Securities

20 Matches
Applying Secure Design Patterns to Microservices Development
sponsored by Whitehat Securities
VIDEO:From a developer's perspective, find out what you can do to improve app security for microservices-based development so that you can find and resolve issues even as you continuously release and iterate code.
Posted: 25 Jan 2018 | Premiered: 16 Jan 2018
Get This Now


2018 Security Predictions for an Unpredictable World
sponsored by Whitehat Securities
VIDEO:Large scale breaches are going to continue to occur, so understanding past breaches and coming up with an attack action plan for the future is necessary. This webinar provides a cybersecurity review of 2017 and offers 2018 predictions for which to prepare.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018
Get This Now


Why Websites Stay Vulnerable: And What You Can Do About It
sponsored by Whitehat Securities
VIDEO:Web application attacks represent a major threat to an organization's security posture. According to the Verizon DBIR, 30% of breaches involve web attacks. Take a look at this webinar to learn about vulnerabilities within websites and how you can increase your web application security.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018
Get This Now


Web Application Authorization and Authentication Explained
sponsored by Whitehat Securities
VIDEO:According to the 2017 Verizon DBIR, 30% of total breaches reported involved attacks on web applications. Explore this webinar to gain insight into application authorization and authentication in order to enhance your application security program.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018
Get This Now


Application Security Testing Magic Quadrant
sponsored by Whitehat Securities
RESOURCE:Application security testing (AST) is growing faster than any other market. Gartner predicts that by 2019, 80% of application security testing vendors will include software composition analysis in their offerings. This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's AST programs as well as a market overview.
Posted: 23 Jan 2018 | Published: 23 Jan 2018
Get This Now


2017 Application Security Statistics Report
sponsored by Whitehat Securities
VIDEO:According to the Verizon DBIR, 30% of total breaches reported involved attacks on web applications. This webinar explores effective application security programs by using data from the WhiteHat Application Security Statistics Report.
Posted: 23 Jan 2018 | Premiered: 16 Jan 2018
Get This Now


Getting the Most out of your AppSec Program
sponsored by Whitehat Securities
VIDEO:According to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program.
Posted: 23 Jan 2018 | Premiered: 23 Jan 2018
Get This Now


Cross-Site Scripting Attacks: Identify and Defend against Malicious Code
sponsored by Whitehat Securities
VIDEO:Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code across web and mobile apps faster.
Posted: 22 Jan 2018 | Premiered: 16 Jan 2018
Get This Now


State of Application Security: Balancing Speed and Risk
sponsored by Whitehat Securities
RESEARCH CONTENT:Explore this SANS report of over 200 IT professionals to see how businesses balance the need to work quickly while also managing risks.
Posted: 22 Jan 2018 | Published: 31 Oct 2017
Get This Now


Design Secure Software from the First Line of Code
sponsored by Whitehat Securities
WHITE PAPER:Explore 6 benefits for developers of a fully automated static analysis security testing (SAST) tool that can bring a focus on security into the beginning of the software development lifecycle.
Posted: 22 Jan 2018 | Published: 31 Dec 2017
Get This Now


DevSecOps Blueprint
sponsored by Whitehat Securities
WEBCAST:The average time to fix vulnerabilities in the DAST industry is 174 days. Take a look at this webcast to uncover successful DevSecOps implementations and data to guide the deployment of DevSecOps in your organization.
Posted: 22 Jan 2018 | Premiered: Jan 22, 2018
Get This Now


Secure Coding Practices: Avoid Mail Command Injection Attacks
sponsored by Whitehat Securities
VIDEO:Just what is web mail command injection, how does it happen, and what can you do to protect yourself? Get the answers to these questions and more in this webcast, where Zach Jones, Senior Director of TRC Static Analysis explores what makes these threats so unique, as well some best practices for mitigating the damage they can cause.
Posted: 19 Jan 2018 | Premiered: 16 Jan 2018
Get This Now


Secure Coding Practices: Avoid OS Command Injection Attacks
sponsored by Whitehat Securities
VIDEO:Watch this webcast to learn what an OS Command Injection does, where you can find it, and what damage it can do. Then, explore some best practices for avoiding, or mitigating the damage of these attacks.
Posted: 19 Jan 2018 | Premiered: 16 Jan 2018
Get This Now


A WhiteHat Sentinel Product Family Overview
sponsored by Whitehat Securities
WHITE PAPER:In this white paper learn how WhiteHat Sentinel, a SaaS product suite combines application scanning with one of the world's largest threat research team to provide you with 3 different types of analysis to ensure your apps are safe, no matter where they live.
Posted: 19 Jan 2018 | Published: 30 Dec 2016
Get This Now


Discover Static Applications Security Testing for Microservices
sponsored by Whitehat Securities
WHITE PAPER:In the race to get to market, the last thing you want is to overlook the security of your microservices architecture. Don't leave your development process vulnerable. Click inside to learn about a Static Applications Security Testing (SAST) offering that allows you to ensure your microservices are as safe as possible.
Posted: 19 Jan 2018 | Published: 19 Jan 2018
Get This Now


A Strategic Approach to Web Application Security
sponsored by Whitehat Securities
WHITE PAPER:App vulnerabilities originate with the source code, and you'll want to secure more of your source code in both development and production. But it's easier said than done for security pros to review source code continuously. Uncover a new static application security testing subscription service to address this problem.
Posted: 18 Jan 2018 | Published: 31 Dec 2017
Get This Now


Getting the Board on Board with Application Security
sponsored by Whitehat Securities
WHITE PAPER:CISOs need to make sure their business considers AppSec from the highest levels. Review these 4 recommendations to improve your business' AppSec and get the support you need.
Posted: 18 Jan 2018 | Published: 31 Dec 2017
Get This Now


Whitehat's Recent Offerings Put Security Expertise at the Developer's Fingertips
sponsored by Whitehat Securities
WHITE PAPER:Read through 451 Research's assessment of WhiteHat Scout and how the product broadens WhiteHat Security's capabilities.
Posted: 17 Jan 2018 | Published: 06 Dec 2017
Get This Now


The Art of Application Security: Getting Started with DevSecOps
sponsored by Whitehat Securities
WHITE PAPER:According to the Verizon DBIR, 60% of breaches involved web app attacks. Take a look at this white paper to discover best practices for application security as well as a case study example to prove the benefits of the application security best practices.
Posted: 17 Jan 2018 | Published: 17 Jan 2018
Get This Now


2017 Application Security Statistics Report
sponsored by Whitehat Securities
RESOURCE:According to the Verizon 2017 DBIR, 30% of total breaches reported involved attacks on web applications. This 60-page application security statistics report provides perspective on the present application security posture of hundreds of organizations, so that enterprises like yours can understand and improve their own security.
Posted: 16 Jan 2018 | Published: 16 Jan 2018
Get This Now


20 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement