IT Management  >   Systems Design and Development  >   Application Development  >  

Coding Vulnerabilities

RSS Feed   
Coding Vulnerabilities White Papers (View All Report Types)
 
Using Security Instrumentation to Analyze and Protect Software
sponsored by Contrast Security
WHITE PAPER: Instrumentation-based application testing can help improve security without skilled security staff or the need to change code. It can also help developers push code into production much faster than formal processes for testing and approval. Dive into this white paper to learn more about the advantages of using instrumentation to automate AppSec.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

Contrast Security

5 Powerful Solutions for Scaling Application Security
sponsored by ZeroNorth
WHITE PAPER: Inside this State of Application Security report, find the most up-to-date findings, discover the 5 most powerful solutions for scaling application security, and explore how the infamously rocky relationship between development and security managed throughout 2020. Download the report here.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

ZeroNorth

Datasheet (eng): Cloud One Container Image Security datasheet
sponsored by Trend Micro
WHITE PAPER: As cloud-first application development strategies become more of the norm, organizations must focus on container security. The Trend Micro Cloud One Container Security platform, designed for DevOps, protects your organization with rapid detection of malware, compliance violations, and vulnerabilities. Download the data sheet to learn more.
Posted: 16 Apr 2020 | Published: 16 Apr 2020

Trend Micro

DEVELOPERS NEED INTEGRATED APPLICATION SECURITY TOOLING
sponsored by Contrast Security
WHITE PAPER: Apps require better collaboration between development and security. In fact, Contrast Security found that 55% of security professionals said it is difficult to get development teams to prioritize remediation of vulnerabilities—even if it’s a performance metric for developers. Learn how to get everyone on board with security in this report.
Posted: 22 Jan 2021 | Published: 22 Jan 2021

Contrast Security

THE FOUR BIGGEST CHALLENGES TO KEEPING MODERN APPLICATIONS SECURE
sponsored by Radware
WHITE PAPER: According to a recent study, just 33% of organizations feel their web application firewall (WAF) addresses all application-targeted threats. While implementing a WAF is an important starting point for ensuring the protection of modern apps, there are other key challenges and threats to consider. Download this report to learn more.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

Radware

Securing the Entire Software Development Pipeline with Veracode Static Analysis
sponsored by Veracode, Inc.
WHITE PAPER: Developers need security testing solutions that can keep the pace with rapid, agile development processes. Traditional AppSec solutions can cause development to stall and delay the release of software. In this guide, learn how static analysis solutions can secure applications without hindering fast development.
Posted: 06 May 2020 | Published: 06 May 2020

Veracode, Inc.

PROTECTING APIS: AN UPHILL BATTLE
sponsored by Contrast Security
WHITE PAPER: Since APIs are the “connective tissue” that holds together the different parts of software, securing them is a critical priority for any organization. With this guide, learn how to embrace API security without overwhelming your team. Get started here.
Posted: 21 Jan 2021 | Published: 21 Jan 2021

Contrast Security

State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Veracode, Inc.

Empower your Developers
sponsored by Coverity by Synopsys
WHITE PAPER: The repercussions of releasing unsecure software in today’s markets are severe – due in large part to the proliferation of constantly-connected, mobile devices. This white paper provides an overview of these challenges, and demonstrates the steps you can take to arm your developers against the risks of modern application development.
Posted: 16 May 2011 | Published: 16 May 2011

Coverity by Synopsys

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences