IT Management  >   Systems Design and Development  >   Application Development  >  

Developing Secure Applications

RSS Feed   
Developing Secure Applications Reports
 
Get a Head Start on Your Application Security Program with Open Source Tools
sponsored by ZeroNorth
WHITE PAPER: In today’s volatile threat landscape and economy, no company can afford to release vulnerable software. Businesses should leverage existing resources—such as open source tools—to create a strategic, comprehensive application security program. Find out how to get a head start on your application security program using open source code in this guide.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

ZeroNorth

State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: In their 11th official State of Software Security report, Veracode looks at what kind of impact the decisions developers make have on software security. Explore the top security concerns of the year—and learn how to navigate around them—here.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Veracode, Inc.

AI, CWPPs & DevSecOps: The Future of Cybersecurity
sponsored by Rezilion
EGUIDE: Artificial intelligence, DevSecOps and cloud security have all emerged as transformative technologies within the cybersecurity industry. This e-guide explores each of these areas by providing 3 expert articles. Read on to unlock your copy.
Posted: 25 Sep 2020 | Published: 01 Sep 2020

Rezilion

Securing Cloud-Native Kubernetes Applications
sponsored by Radware
WHITE PAPER: When businesses look to optimize and accelerate application development life cycles and deliver their applications in public clouds, security becomes a greater challenge. In this white paper, learn how to ensure the timely development and deployment of secure applications across hybrid computing environments.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

Radware

PROTECTING APIS: AN UPHILL BATTLE
sponsored by Contrast Security
WHITE PAPER: Since APIs are the “connective tissue” that holds together the different parts of software, securing them is a critical priority for any organization. With this guide, learn how to embrace API security without overwhelming your team. Get started here.
Posted: 21 Jan 2021 | Published: 21 Jan 2021

Contrast Security

A Comprehensive Approach to DevSecOps
sponsored by Contrast Security
WHITE PAPER: More than half of organizations in a recent study say that their security team has reached a tipping point where the number of security tools in place has adversely impacted their security posture and increased risk. Stuck in the AppSec tool swamp? Learn about a unified AppSec platform that can alleviate this problem.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

Contrast Security

Implementing Cloud Native Security: Shift-Left To Increase Effectiveness
sponsored by Palo Alto Networks
WHITE PAPER: Cloud security trends like “shift-left security” and “DevSecOps” refer to new strategies and paradigms that help organizations keep workloads secure in the age of cloud-based, scale-out, constantly changing applications and infrastructure. This guide explores what modern, shift-left security entails.
Posted: 24 Mar 2021 | Published: 13 Nov 2020

Palo Alto Networks

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper, CSO explores why desktop virtualization should be core to your information security foundation.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix

Mobile Security Solutions: Securing & Leveraging Mobile Devices
sponsored by Entrust, Inc.
WHITE PAPER: This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.
Posted: 23 Jul 2012 | Published: 23 Jul 2012

Entrust, Inc.

How to Secure Your Microsoft SharePoint Products
sponsored by Thawte Inc.
EGUIDE: This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order.
Posted: 22 May 2013 | Published: 22 May 2013

Thawte Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info