IT Management  >   Systems Design and Development  >   Application Development  >  

Developing Secure Applications

RSS Feed   
Developing Secure Applications Reports
 
Security at the Speed of Software Development
sponsored by WhiteSource
WEBCAST: DevSecOps is expected to grow for years to come and many companies have recognized the need to reposition to look more like DevSecOps. However, a lot of that repositioning is just marketing and there is no attempt to really make the transition. In this webcast, Larry Maccherone discusses a 3-part framework for adopting the DevSecOps culture.
Posted: 15 Jan 2019 | Premiered: May 9, 2018

WhiteSource

Transform Incident Response Lifecycle Management with VIA's Digital Operations Solutions
sponsored by Vitria Technology, Inc.
WHITE PAPER: Real-time analytics, AI, machine learning, and IoT are transforming Incident Response Lifecycle Management and providing enormous operational improvements in telecom service performance. In this white paper, learn how VIA and Digital Operations Solutions support incident response lifecycle management.
Posted: 08 Mar 2019 | Published: 08 Mar 2019

Vitria Technology, Inc.

Corelight Webcast: New SIEM on the Block -- Meet Humio
sponsored by Corelight
WEBCAST: Bro network security monitoring is an open source tool. It turns raw network traffic into comprehensive network logs organized by protocol, with key fields extracted specifically for security use cases. In this webcast, watch a demo to see how Corelight's technical integration with Humio allows you to economically monitor all your network traffic.
Posted: 28 Jan 2019 | Premiered: Aug 21, 2018

Corelight

Web Application Firewalls: 2018 Market Landscape
sponsored by F5 Networks
RESEARCH CONTENT: In recent years, WAFs have evolved to be more usable, scalable, and better able to respond automatically to threats. This makes them relevant in today's world of smart, motivated attackers and hybrid applications. In this research report, Forrester assess the state of the WAF market and how vendors stack up against each other.
Posted: 15 Feb 2019 | Published: 25 Jun 2018

F5 Networks

A Patch Made in Heaven
sponsored by Kaseya
WHITE PAPER: As breaches become more prevalent, IT professionals must accept patch management for what it is — a way to create a robust security layer with the routine and timely installation of patches. Time being the most critical element. In this white paper, learn about 3 critical components to any effective patch management strategy.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

Kaseya

Meet the Experts: Open Source Security 101
sponsored by WhiteSource
WEBCAST: According to Forrester, 80% of developers used open source in their applications in the past year. When using open source, you must consider the security of the application. This webinar provides a high level overview of considerations that engineering teams and security officers should keep in mind when tackling open source security issues.
Posted: 14 Jan 2019 | Premiered: Jan 26, 2017

WhiteSource

Reinvent Endpoint Security with Management Print Services
sponsored by HP
PRODUCT OVERVIEW: Download this white paper to learn about HP Secure Managed Print Services (MPS), and how they simplify print security by assessing risks, securing and managing your fleet, maintaining printer security compliance, and keeping everything up-to-date with the latest protections.
Posted: 04 Mar 2019 | Published: 04 Mar 2019

HP

Mastering Mobile Application Management: How to Adopt MAM
sponsored by IBM
EBOOK: Enhance your MAM understanding with proven best practices that'll help you to solve app compatibility, security, and adoption issues.
Posted: 24 Mar 2015 | Published: 24 Mar 2015

IBM

E-Book: Technical Guide on Application Security: Secure Development
sponsored by IBM
EBOOK: When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

IBM

Buyer's Essentials: What to Look for in an EMM Strategy
sponsored by SearchSecurity.com
EBOOK: EMM products can contain a variety of features - for mobile device management, mobile app management, mobile content management and more. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement