IT Management  >   Systems Design and Development  >   Application Development  >  

Developing Secure Applications

RSS Feed   
Developing Secure Applications White Papers (View All Report Types)
 
A DevSecOps Guide
sponsored by Aqua Security
WHITE PAPER: After understanding the value of a DevOps mindset, making the cultural shift and reaping the benefits, many companies are aiming for the next big step: integrating development, operations, and security into one organization. In this white paper, learn how to successfully implement DevSecOps in your organization.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Aqua Security

The Complete Guide to Performance Testing Your Retail Websites and Apps
sponsored by Akamai Technologies
WHITE PAPER: Today retailers are pressured to balance a compelling online shopping experience, as well as a fast and reliable one. While it sounds difficult, it doesn't have to be. In this best practices guide, learn how you can get started with performance testing to help you maintain this balance.
Posted: 27 Dec 2018 | Published: 27 Dec 2018

Akamai Technologies

Security for Microservices: Best Practices
sponsored by Aporeto
WHITE PAPER: Moving to a microservices framework and adoption of cloud-native services introduces new security considerations for developers, line-of-business owners, and security teams. In this white paper, explore best practices for security in a microservices environment.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Aporeto

Introduction to DevSecOps
sponsored by Contrast Security
WHITE PAPER: Gartner has named DevSecOps one of their fastest-growing areas of interest and predicts that DevSecOps will be embedded into 80% of rapid development teams by 2021. In this white paper, explore 4 core practices to any DevSecOps initiative.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Contrast Security

4 Ways to Improve Your DevOps Testing
sponsored by xMatters, Inc.
WHITE PAPER: Explore some of the most common DevOps testing mistakes and learn how to optimize your testing processes. Delve down into topics like why service monitoring and testing matter, and how DevOps is failing 3 key tenets of privacy compliance.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

xMatters, Inc.

Automated Security at the Speed of DevOps
sponsored by Trend Micro, Inc.
WHITE PAPER: As organizations implement DevOps on AWS, they need to understand the security implications. In this white paper, explore the main challenges businesses face at the intersection of DevOps and security. Also, learn best practices for integrating security within your development process from the start.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Trend Micro, Inc.

Empower your Developers
sponsored by Coverity by Synopsys
WHITE PAPER: The repercussions of releasing unsecure software in today’s markets are severe – due in large part to the proliferation of constantly-connected, mobile devices. This white paper provides an overview of these challenges, and demonstrates the steps you can take to arm your developers against the risks of modern application development.
Posted: 16 May 2011 | Published: 16 May 2011

Coverity by Synopsys

An Integrated Approach to Managing Application Security
sponsored by IBM
WHITE PAPER: This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper, CSO explores why desktop virtualization should be core to your information security foundation.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement