IT Management  >   Systems Design and Development  >   Application Development  >  

Coding Vulnerabilities

RSS Feed   
Coding Vulnerabilities Reports
 
Secure App Development: Success Story
sponsored by Micro Focus
WEBCAST: Tune into this webcast to learn about a security tool that was designed for developers and allows developers to jump into the tool at any point to create a secure software development lifecycle program.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019

Micro Focus

Circumventing a Blacklist to Exploit Cross-Site Scripting
sponsored by WhiteHat Security
PRODUCT OVERVIEW: Discover how a cross-site scripting (XSS) vulnerability was found during an assessment of a financial services website and how the tester managed to get around the malicious script.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

WhiteHat Security

Computer Weekly buyer's guide to mobile app development
sponsored by ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

ComputerWeekly.com

The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER: Security operations are often slowed down by manual processes that would be better left to machines. As a result, security orchestration and automation is becoming an increasingly vital aspect of many organizations' security strategies. In this white paper, explore the benefits and value of security orchestration and automation.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Rapid7

DevSecOps at Hulu: When DevOps and Security Meet
sponsored by Signal Sciences
VIDEO: Today modern technical companies like Hulu have been adopting a culture where DevOps and security operate as one. In this webinar, hear from Emilio Escobar, Director of Information Security at Hulu, as he discusses how Hulu successfully brought security into the DevOps ecosystem, the benefits of a DevOps culture, and more.
Posted: 25 Feb 2019 | Premiered: 25 Feb 2019

Signal Sciences

Top 7 Reasons Why Organizations Choose WhiteHat Security
sponsored by WhiteHat Security
RESOURCE: In this infographic, find out the top 7 reasons organizations choose to work with WhiteHat Security.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

WhiteHat Security

Using Cyclomatic Path Analysis to Detect Security Vulnerabilities
sponsored by McCabe Software, Inc.
WHITE PAPER: The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

McCabe Software, Inc.

An Exclusive Guide for Promoting Enterprise Mobility Management
sponsored by SearchMobileComputing
EBOOK: This e-book takes readers through the process of enabling and managing a secure mobile workforce. Access this resource to understand how mobility can increase agility—and why security concerns, while important, shouldn't stop mobility in your organization from taking off.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

SearchMobileComputing

An Integrated Approach to Managing Application Security
sponsored by IBM
WHITE PAPER: This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

Mastering Mobile Application Management: How to Adopt MAM
sponsored by IBM
EBOOK: Enhance your MAM understanding with proven best practices that'll help you to solve app compatibility, security, and adoption issues.
Posted: 24 Mar 2015 | Published: 24 Mar 2015

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement