All resources sponsored by:

Contrast Security

10 Matches
NIST Application Security Revisions You Need to Know
sponsored by Contrast Security
RESOURCE:NIST is a standard leader in the cybersecurity space that sets guidelines for organizations to follow across different areas of security. This landing page contains several useful resources focusing on the NIST revisions to their application security guidelines.
Posted: 21 Apr 2020 | Published: 21 Apr 2020
Get This Now


Continuous Application Security: A Unified Approach Across the SDLC
sponsored by Contrast Security
WEBCAST:This webinar makes the case for instrumentation-based unified application security. With IAST and RASP, the security strategy can detect vulnerabilities, prevent exploits, secure data, and maintain compliance. Watch the webinar now to find out more.
Posted: 20 Apr 2020 | Premiered: Apr 20, 2020
Get This Now


Security Instrumentation is the Future of All Software
sponsored by Contrast Security
WEBCAST:We’re in a software security crisis—and we have been for a while now. In both 2000 and 2019, applications had an average of 26.7 serious vulnerabilities. This webinar examines the state of application security and considers how strong instrumentation-based application security platforms are key to finally uniting development and security.
Posted: 20 Apr 2020 | Premiered: Apr 20, 2020
Get This Now


Securing APIs at DevOps Speed
sponsored by Contrast Security
WEBCAST:When APIs are insecure, we still have something to work with—and the sooner we’re aware of the security threats, the better. In this webinar, learn about the different approaches to API security and how API security can fit into DevOps methodologies for the best results. Watch the webinar here.
Posted: 17 Apr 2020 | Premiered: Apr 17, 2020
Get This Now


AppSec Guide: Complying with New NIST SP 800-53 IAST & RASP Requirements
sponsored by Contrast Security
WHITE PAPER:The newly released AppSec requirements from the National Institute of Standards and Technology (NIST) outline the need to address specific software vulnerabilities in response to the increasing volume of automated attacks. This whitepaper highlights what to expect with the new requirements and provides 4 key steps for ensuring compliance.
Posted: 10 Apr 2020 | Published: 30 Mar 2020
Get This Now


Using Security Instrumentation to Analyze and Protect Software
sponsored by Contrast Security
WHITE PAPER:Instrumentation-based application testing can help improve security without skilled security staff or the need to change code. It can also help developers push code into production much faster than formal processes for testing and approval. Dive into this white paper to learn more about the advantages of using instrumentation to automate AppSec.
Posted: 09 Apr 2020 | Published: 09 Apr 2020
Get This Now


Contrast Assess Route Intelligence
sponsored by Contrast Security
DATA SHEET:Learn how Contrast Assess Route Intelligence transforms AppSec by observing the routes of an application while it’s running—thereby exposing all the different points of entry into the application.
Posted: 09 Apr 2020 | Published: 09 Apr 2020
Get This Now


Perimeter Security Noise Leaves Applications Vulnerable to Attacks
sponsored by Contrast Security
WHITE PAPER:Learn how you can get AppSec protection that can compensate with the necessary visibility, accuracy, scalability, and ease of deployment to keep pace with modern application vulnerabilities without generating false positives and false negatives.
Posted: 08 Apr 2020 | Published: 08 Apr 2020
Get This Now


A Comprehensive Approach to DevSecOps
sponsored by Contrast Security
WHITE PAPER:More than half of organizations in a recent study say that their security team has reached a tipping point where the number of security tools in place has adversely impacted their security posture and increased risk. Stuck in the AppSec tool swamp? Learn about a unified AppSec platform that can alleviate this problem.
Posted: 08 Apr 2020 | Published: 08 Apr 2020
Get This Now


The Continuous Application Security Handbook
sponsored by Contrast Security
EBOOK:With widespread enterprise reliance on automated software and applications, security has become a concern that haunts just about every tech-driven business. Download this handbook for a look into continuous application security, and how to establish the three key layers of security within your own applications.
Posted: 25 Jul 2019 | Published: 31 Dec 2017
Get This Now


10 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info