IT Management  >   Systems Design and Development  >   Application Development  >  

Coding Vulnerabilities

RSS Feed   
Coding Vulnerabilities Multimedia (View All Report Types)
 
State of Container Security
sponsored by Red Hat
WEBCAST: Tune into this video from Daniel J Walsh, leader of the container run time/engines team at RedHat, on his approach to container security. In the video he compares the act of securing containers to Goldilocks and the Three Bears. Security needs to be just right.
Posted: 27 Jan 2021 | Premiered: Jan 27, 2021

Red Hat

Securing the Cloud Crowdcast
sponsored by CrowdStrike
WEBCAST: Gartner says that by 2025, more than 85% of global organizations will be running containerized applications. Watch this webinar featuring CrowdStrike CTO Michael Sentonas as he discusses securing cloud workloads with DevSecOps practices and methodologies.
Posted: 06 Apr 2021 | Premiered: Apr 6, 2021

CrowdStrike

DevSecOps for Cloud-Native Applications with Prisma Cloud
sponsored by Red Hat
WEBCAST: Enterprises modernize legacy applications to take advantage of containers, and Red Hat’s OpenShift Container Platform strives to help them build, deploy and manage their applications. How can they modernize security alongside? Jump into this webinar to learn the additional protection that cloud-native security can provide for OpenShift users.
Posted: 14 Apr 2021 | Premiered: Feb 4, 2021

Red Hat

Whitehat Security Webinar
sponsored by WhiteHat Security
WEBCAST: Dynamic Application Security Testing (DAST) enables AppSec teams with the ability to assess and address the actual risk of their applications – providing critical security capabilities to support DevSecOps initiatives. Watch this webinar to learn more about DAST and how it can support your AppSec goals.
Posted: 10 Dec 2020 | Premiered: Dec 10, 2020

WhiteHat Security

Securing a multitenant Kubernetes cluster with Red Hat
sponsored by Red Hat
WEBCAST: To have the biggest impact with Kubernetes, you need strong multitenancy with security built in across all layers of the software stack. View this webinar for best practices on managing container content, registries, the build process, and the deployment process in multitenant cluster.
Posted: 28 Jan 2021 | Premiered: Jan 28, 2021

Red Hat

Solving Kubernetes Security Challenges Using Red Hat OpenShift and Sysdig
sponsored by Red Hat
WEBCAST: Kubernetes accelerates application delivery, but it can also complicate security, visibility and compliance. With the right solutions, DevOps teams can reap the benefits of cloud-native infrastructure and keep risk low. Access this webinar to learn how 3 global companies avoided security and compliance issues using Red Hat OpenShift and Sysdig.
Posted: 09 Apr 2021 | Premiered: Dec 17, 2020

Red Hat

Securing Red Hat OpenShift Containerized Applications at Enterprise Scale
sponsored by Red Hat
WEBCAST: Over 90% of Fortune 500 companies leverage Red Hat products and solutions – one of which is their OpernShift platform for containerized applications. Professionals looking to add additional security for OpenShift should leverage this webinar detailing how CyberArk’s out-of-the-box integrations can help, demo included.
Posted: 13 Apr 2021 | Premiered: Jun 24, 2020

Red Hat

Reduce API Security Risks with Automated and Continuous API Scanning
sponsored by WhiteHat Security
WEBCAST: Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent history. How do we reduce API security risks? View this webcast to learn why testing may be the key.
Posted: 20 Nov 2020 | Premiered: Jul 15, 2020

WhiteHat Security

Podcast: How Security is well suited for Agile development
sponsored by IBM
PODCAST: Tune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and why how security is linked to the software development lifecycle.
Posted: 09 Jun 2011 | Premiered: Jun 7, 2011, 13:30 EDT (17:30 GMT)

IBM

Webcast: How Security is well suited for Agile development
sponsored by IBM
WEBCAST: View this webcast as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and how security is linked to the software development lifecycle.
Posted: 15 Jun 2011 | Premiered: Jun 15, 2011

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences