IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Programming

RSS Feed   
Secure Programming White Papers (View All Report Types)
11 Security Analytics Providers Slug it Out
sponsored by LogRhythm, Inc.
WHITE PAPER: Forrester surveys indicate that 74% of global enterprise security technology decision makers rate improving security monitoring as a high or critical priority. In this Forrester report, discover an in-depth look at 11 security analytics vendors: where they excel, fall short, and how they compare to one another.
Posted: 14 Sep 2017 | Published: 06 Mar 2017

LogRhythm, Inc.

How To Securely Configure A Linux Host To Run Containers
sponsored by Twistlock, Inc.
WHITE PAPER: Discover how to update traditional security for containerized, microservices-based app development by learning how to securely configure a Linux host to run Docker containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Top 10 Caveats Mobile IT Admins Need to Know about Windows 10
sponsored by MobileIron
WHITE PAPER: Download this resource for a list of the top 10 things you need to know about Windows 10 to keep pace with industry updates and your peers.
Posted: 05 Aug 2015 | Published: 05 Aug 2015


State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Veracode, Inc.

The Path to a Secure Application: A Source Code Security Review Checklist
sponsored by Ounce Labs, an IBM Company
WHITE PAPER: Read this white paper to learn a checklist to find and eliminate the source coding errors and design flaws that expose data, threaten operations, and cost your organization time and money.
Posted: 05 Feb 2007 | Published: 01 Feb 2007

Ounce Labs, an IBM Company

Metrics That Matter: Quantifying Software Security Risk
sponsored by Fortify Software
WHITE PAPER: Software security presents new measurement challenges: there are no established formulas for quantifying the security risk present in an application. This paper provides a set of metrics for ensuring an accurate view of software projects.
Posted: 07 May 2007 | Published: 01 Jan 2006

Fortify Software

The State of Mobile Application Insecurity
sponsored by IBM MaaS360
WHITE PAPER: This research report conducted by Ponemon Institute examines why mobile app security eludes many organizations and offers steps to strengthen your security policies and minimize vulnerabilities. Read on to learn more.
Posted: 17 Apr 2015 | Published: 25 Feb 2015

IBM MaaS360

Sharks in the AppPool: Managing Your Web Presence While Protecting the Hosting Resources You Pay For
sponsored by Verio
WHITE PAPER: This white paper details hosting best practices, discussing the advantages associated with the use of isolated, rather than shared, AppPools in a Windows-based hosting environment.
Posted: 27 Aug 2007 | Published: 01 Sep 2006


Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012


Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.
Posted: 23 Aug 2016 | Published: 01 Jul 2016


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement