IT Management  >   Systems Design and Development  >   Application Development  >  

Coding Vulnerabilities

RSS Feed   
Coding Vulnerabilities Reports
 
Security at the Speed of Software Development
sponsored by WhiteSource
WEBCAST: DevSecOps is expected to grow for years to come and many companies have recognized the need to reposition to look more like DevSecOps. However, a lot of that repositioning is just marketing and there is no attempt to really make the transition. In this webcast, Larry Maccherone discusses a 3-part framework for adopting the DevSecOps culture.
Posted: 15 Jan 2019 | Premiered: May 9, 2018

WhiteSource

Cybersecurity for Connected Maintenance Apps
sponsored by Irdeto
EBOOK: In the age of Industry 4.0, connected maintenance apps play an important role in creating a thriving service & maintenance business. However, deploying mobile apps in a hostile environment where they can be easily reverse engineered may have quite the opposite effect. In this eBook, learn what a good application security strategy looks like.
Posted: 25 Feb 2019 | Published: 25 Feb 2019

Irdeto

Transform Incident Response Lifecycle Management with VIA's Digital Operations Solutions
sponsored by Vitria Technology, Inc.
WHITE PAPER: Real-time analytics, AI, machine learning, and IoT are transforming Incident Response Lifecycle Management and providing enormous operational improvements in telecom service performance. In this white paper, learn how VIA and Digital Operations Solutions support incident response lifecycle management.
Posted: 08 Mar 2019 | Published: 08 Mar 2019

Vitria Technology, Inc.

Secure App Development: Success Story
sponsored by Micro Focus
WEBCAST: Tune into this webcast to learn about a security tool that was designed for developers and allows developers to jump into the tool at any point to create a secure software development lifecycle program.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019

Micro Focus

2018 Application Security Statistics Report
sponsored by WhiteHat Security
WHITE PAPER: This application security statistics report provides an analysis of the state of application security, brings to the forefront evolutionary trends, and highlights best practices that result in better application security over time. The report also presents challenges and opportunities to secure the applications.
Posted: 07 Dec 2018 | Published: 31 Dec 2018

WhiteHat Security

Automating Security for DevOps: Best Practices for Securing the Continuous Integration and Continuous Delivery (CI/CD) Pipeline
sponsored by Symantec
WHITE PAPER: While organizations are interested in integrating security with DevOps processes, they find it difficult to find specifics on how to get started. In this best practices guide, learn how to leverage automation to assure the right cybersecurity measures are applied at each step of the CI/CD pipeline.
Posted: 26 Feb 2019 | Published: 26 Feb 2019

Symantec

Mobile Security Solutions: Securing & Leveraging Mobile Devices
sponsored by Entrust, Inc.
WHITE PAPER: This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.
Posted: 23 Jul 2012 | Published: 23 Jul 2012

Entrust, Inc.

Protecting Web Applications from Attack and Misuse
sponsored by Citrix
WHITE PAPER: Application-layer attacks against business-critical web applications are the most serious IT security threat facing enterprises today. Read this white paper to learn how to improve web application security for your enterprise.
Posted: 27 Jul 2006 | Published: 01 Jul 2006

Citrix

Buyer's Essentials: What to Look for in an EMM Strategy
sponsored by SearchSecurity.com
EBOOK: EMM products can contain a variety of features - for mobile device management, mobile app management, mobile content management and more. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

SearchSecurity.com

Be a Web App Security Superhero
sponsored by SearchSecurity.com
EBOOK: To secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.
Posted: 07 Apr 2015 | Published: 07 Apr 2015

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement