IT Management  >   Systems Design and Development  >   Application Development  >  

Coding Vulnerabilities

RSS Feed   
Coding Vulnerabilities Reports
 
Achieving CloudSecOps Maturity
sponsored by DivvyCloud
WHITE PAPER: When it comes to establishing cloud security operations (CloudSecOps) methods, organizations tend to begin with in-house solutions. In this white paper, discover the limitations of in-house solutions, and realize when it’s time to look elsewhere.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

DivvyCloud

The State of Web Application Security
sponsored by Radware
WHITE PAPER: Download this white paper on web application security for a summary of current global perceptions on the state of application attacks, and insights on how to best identify and mitigate threats in the future.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

Radware

Cloud One™ - Application Security
sponsored by Trend Micro
DATA SHEET: As businesses realign to cloud-native application architectures, it’s imperative to keep security at the top of the list of priorities. To learn how application security can integrate into your application delivery and customer satisfaction, download this data sheet now.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

Trend Micro

VMs vs. containers: Which is better for security?
sponsored by ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 02 Oct 2019 | Published: 02 Oct 2019

ComputerWeekly.com

Securing the Entire Software Development Pipeline with Veracode Static Analysis
sponsored by Veracode, Inc.
WHITE PAPER: Developers need security testing solutions that can keep the pace with rapid, agile development processes. Traditional AppSec solutions can cause development to stall and delay the release of software. In this guide, learn how static analysis solutions can secure applications without hindering fast development.
Posted: 06 May 2020 | Published: 06 May 2020

Veracode, Inc.

Sentinel Auto API
sponsored by WhiteHat Security
DATA SHEET: Traditional API testing is manual, time-consuming, and widely unpopular. In fact, less than 25% of organizations are testing their APIs. However, the critical nature of APIs requires them to be protected. In this data sheet, take a closer look at the key features of Sentinel Auto API and see if it meets for your API security needs.
Posted: 16 Apr 2020 | Published: 16 Apr 2020

WhiteHat Security

E-Book: Technical Guide on Application Security: Secure Development
sponsored by IBM
EBOOK: When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

IBM

Be a Web App Security Superhero
sponsored by SearchSecurity.com
EBOOK: To secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.
Posted: 07 Apr 2015 | Published: 07 Apr 2015

SearchSecurity.com

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

The Essential Guide for Threat Intelligence Services: What to Look For
sponsored by SearchSecurity.com
EBOOK: This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info