Source Code Management

Source Code Management Multimedia (View All Report Types)
Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

Klocwork

Can I Really Roll-out a Code Review Process That Doesn’t Suck?
sponsored by SmartBear Software
WEBCAST: This webcast takes you through the methods that have been found to be most effective in implementing a code review process and the processes and steps to get you started. Learn about topics including the benefits of code review, how to implement code reviews, and more.
Posted: 27 Aug 2012 | Premiered: Aug 27, 2012

SmartBear Software

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Agile Development with IBM Rational Synergy and IBM Rational Team Concert
sponsored by IBM
WEBCAST: See how to take advantage of these RTC and Jazz features with Synergy and Change source control and change management.
Posted: 04 Apr 2011 | Premiered: Apr 4, 2011

IBM

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WEBCAST: This webcast outlines the steps most of Veracode's customers take to develop a mature application security program and provides more information on mature AppSec programs.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

TOPICS:  IT Management
Veracode, Inc.

POWER8 Cost Savings Estimator
sponsored by IBM
WEBCAST: See how much you can save.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management
IBM

Experience Dynamic Endpoint Threat Defense
sponsored by McAfee, Inc.
VIDEO: Simplify your system and stay ahead of advanced threats with a collaborative framework that shares threat intelligence.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

You May Not Know It yet, but You Need All-Flash Storage
sponsored by IBM
WEBCAST: Innovations in all-flash array may be a little ahead of market demand, but provide great opportunities for IT leaders.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management
IBM

Evolution of the Security Operations Center
sponsored by McAfee, Inc.
VIDEO: Hear an overview on how SOC is defined within the industry, a history of SOCs and model options for your organization.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.