IT Management  >   Systems Design and Development  >   Application Development  >  

Security Development Lifecycle

RSS Feed   
Security Development Lifecycle White Papers (View All Report Types)
 
Container Security 101: Understanding the Basics of Securing Containers
sponsored by Palo Alto Networks
WHITE PAPER: Container environments bring a range of cybersecurity issues involving images, containers, hosts, runtimes, registries, and orchestration platforms, which all need to be secured. Not sure where to begin? Download Container Security 101: Understanding the Basics of Securing Containers for everything you need to know.
Posted: 08 Jun 2020 | Published: 08 Jun 2020

Palo Alto Networks

Enabling a SASE Approach to Private Application Access and Security
sponsored by Axis Security
WHITE PAPER: Enterprises still lag in delivering and securing private applications to business users due to legacy security and access methods. Some businesses bring their legacy apps to the cloud, but these ‘cloudified’ apps still tend to underperform. Stop living in the past – check out this white paper on the Application Access Cloud by Axis Security.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

11 Recommended Security Practices to Manage the Container Lifecycle
sponsored by VMware Tanzu
WHITE PAPER: Development, security, and operations leaders all share a common concern: application security across the software development lifecycle. The problem is, no team wants to fully claim this challenge as their own. Download this guide to learn about 11 security practices that everyone can get behind.
Posted: 04 Feb 2021 | Published: 04 Feb 2021

VMware Tanzu

ZeroNorth, Bringing End-to-End Clarity to Application Security
sponsored by ZeroNorth
WHITE PAPER: The explosion of software applications is producing an exponential increase in the overall application attack surface. Luckily, security automation platforms are designed to prevent this problem exactly. Learn how a security automation platform can help your organization stay secure here.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

ZeroNorth

Mistakes to Love: A Survey of Identity Mistakes
sponsored by Auth0
WHITE PAPER: For leading application development teams, there seems to be debate around buying vs building. The following report provides in-depth insights from a survey into the successes and failures of identity professionals across their identity projects – both bought and build. Read on to unlock the key findings.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Auth0

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper, CSO explores why desktop virtualization should be core to your information security foundation.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix

Blog: DevOps for the mainframe
sponsored by IBM
WHITE PAPER: Learn the basics of DevOps and important information you need to know in order to create a successful strategy.
Posted: 18 Oct 2013 | Published: 18 Apr 2013

IBM

State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Veracode, Inc.

Mobile Security Solutions: Securing & Leveraging Mobile Devices
sponsored by Entrust, Inc.
WHITE PAPER: This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.
Posted: 23 Jul 2012 | Published: 23 Jul 2012

Entrust, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences