IT Management  >   Systems Design and Development  >   Application Development  >  

Coding Vulnerabilities

RSS Feed   
Coding Vulnerabilities Reports
 
AppSec Performance Package
sponsored by WhiteHat Security
DATA SHEET: Whether your team is creating its first AppSec program or searching for expert program management to move security left, WhiteHat Security’s AppSec Performance Package might be able to help. Save this data sheet to see how WhiteHat can help your team identify program risks and secure more applications in less time, with less in-house resources.
Posted: 10 Feb 2021 | Published: 10 Feb 2021

WhiteHat Security

Traceable Overview CTA Demo
sponsored by Traceable
VIDEO: View this video overview of Traceable and how it uses security observability with artificial intelligence and machine learning to secure modern application architectures and their API's.
Posted: 12 Feb 2021 | Premiered: 12 Feb 2021

Traceable

What Runtime Application Self-Protection (RASP) Doesn’t Solve
sponsored by Traceable
RESOURCE: Tap into this article for RASP’s or Runtime Application Self-Protection’s, strengths and weaknesses in protecting against modern security threats.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Traceable

Security in the Fast Lane: Day 2
sponsored by WhiteHat Security
WEBCAST: When and where do you think about security? In this exclusive webinar series, join WhiteHat Security and TIBCO experts as they discuss what it means to be in the fast lane of developing and delivering modern—and secure—SaaS products. Tune in to the conversation here.
Posted: 14 Jan 2021 | Premiered: Sep 30, 2020

WhiteHat Security

Application Security: The Easy Way
sponsored by Ionic Security
RESOURCE: Securing internal applications is a top priority among IT security teams. Yet achieving it is time & resource consuming. In fact, 76% of total IT expenditure is spent on securing internal apps. It doesn’t need to be so difficult – this blog post highlights how Ionic’s data-centric Machina Tools may be able to help. Read on to learn more.
Posted: 03 Mar 2020 | Published: 16 Aug 2018

Ionic Security

Leve raging AI to Automate Vulnerability Management
sponsored by Dell SecureWorks
DATA SHEET: Today’s organizations need vulnerability management (VM) solutions that are built to maximize risk reduction. With the power of ML, these same organizations can minimize the manual burden on InfoSec and IT operations teams. Download this data sheet to explore how Secureworks’ VM solution strives to do all this and more.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Dell SecureWorks

One of The World’s Largest Fast-Food Chains Secures Business-Critical Applications with WhiteHat Security
sponsored by WhiteHat Security
CASE STUDY: In this case study, learn how one of the world’s largest fast-food chains succeeded in implemented ongoing testing and monitoring of their business-critical applications to proactively defend themselves from application-specific attacks. Get the details here.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

WhiteHat Security

VMs vs. containers: Which is better for security?
sponsored by ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 02 Oct 2019 | Published: 02 Oct 2019

ComputerWeekly.com

Presentation Transcript: Are your applications cloud-ready?
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript discusses the importance of application security, and describes the tools and processes you should be putting in place to ensure that your applications are secure as you move them to the cloud.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

IBM

The Essential Guide for Threat Intelligence Services: What to Look For
sponsored by SearchSecurity.com
EBOOK: This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences