IT Management  >   Systems Design and Development  >   Application Development  >  

Coding Vulnerabilities

RSS Feed   
Coding Vulnerabilities Reports
 
LogRhythm '2018 Cybersecurity Perceptions and Practices Benchmark Survey'
sponsored by LogRhythm, Inc.
ANALYST REPORT: Find out why security teams need to be working more intentionally to take time to understand the full scope of an incident and determine how to best neutralize it.
Posted: 27 Apr 2018 | Published: 27 Apr 2018

LogRhythm, Inc.

Application Security Evolved: How to Use Attacker-Centric Security to Fix the WAF
sponsored by ThreatX
WHITE PAPER: Download this white paper for a security team's guide to the current state of web application security.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

ThreatX

2018 Application Security Statistics Report
sponsored by WhiteHat Security
WHITE PAPER: This application security statistics report provides an analysis of the state of application security, brings to the forefront evolutionary trends, and highlights best practices that result in better application security over time. The report also presents challenges and opportunities to secure the applications.
Posted: 07 Dec 2018 | Published: 31 Dec 2018

WhiteHat Security

A Tale of Two Teams
sponsored by Veracode, Inc.
WHITE PAPER: As DevSecOps changes the way software is created and distributed, it is also changing the roles and responsibilities of the development and security teams. Explore these new processes and priorities for each team throughout the software lifecycle.
Posted: 03 May 2018 | Published: 03 May 2018

Veracode, Inc.

Computer Weekly buyer's guide to mobile app development
sponsored by ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

ComputerWeekly.com

The Ten Must Haves for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER: Businesses are changing their traditions as employees continue to adopt mobile phone practices. Enterprise mobility may be efficient, but it can also put important company data at risk. Learn more about how you can have secure mobile device management with this valuable resource.
Posted: 01 Aug 2012 | Published: 01 Aug 2012

Zenprise

WAN Optimization: Expert Guidelines to Management and Security
sponsored by SearchNetworking.com
EBOOK: What is the next step for WAN management? This expert guide explains why WAN optimization is now the norm and provides guidelines for an all-in-one strategy to minimize cost, complexity, and risk within your organization.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

SearchNetworking.com

The Proactive Security Paradigm: How Containers Can Revamp Your Approach To Security
sponsored by Twistlock, Inc.
WHITE PAPER: Learn how to integrate security into DevOps with a container-first security platform that creates more secure microservices-based app development environments and uncover 6 often overlooked security benefits of containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


An Integrated Approach to Managing Application Security
sponsored by IBM
WHITE PAPER: This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

The Modern Mobility E-Zine: An Exclusive Look at Enterprise Mobility
sponsored by SearchMobileComputing
EZINE: Access this e-zine to learn how the role of DevOps is changing as enterprise mobility matures. Read on here to see how fusing mobile app development and management can change the way IT delivers mobile information to users.
Posted: 14 Apr 2015 | Published: 13 Apr 2015

SearchMobileComputing
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement