IT Management  >   Systems Design and Development  >   Application Development  >  

Developing Secure Applications

RSS Feed   
Developing Secure Applications Reports
 
Secure Software Development in the Financial Services Industry
sponsored by GitHub
RESOURCE: Find out how financial service institutions (FSIs) can meet strict security regulations and create a culture of truly secure software development to deliver the best possible products while safeguarding customer data.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

GitHub

LogRhythm '2018 Cybersecurity Perceptions and Practices Benchmark Survey'
sponsored by LogRhythm, Inc.
ANALYST REPORT: Find out why security teams need to be working more intentionally to take time to understand the full scope of an incident and determine how to best neutralize it.
Posted: 27 Apr 2018 | Published: 27 Apr 2018

LogRhythm, Inc.

Security Report for In-Production Web Applications
sponsored by Rapid7
RESEARCH CONTENT: This report was designed to uncover new areas of risk in application security, and confirm the presence of threats, vulnerabilities, and security incidents that teams have previously only suspected. Download the report to explore the top 5 most common application security incidents including cross-site scripting, SQL injections and more.
Posted: 07 May 2019 | Published: 07 May 2019

Rapid7

Build Application Security into the Entire SDLC
sponsored by Micro Focus
WHITE PAPER: 84% of security breaches exploit vulnerabilities at the application layer. And, software security is still an afterthought for developers. In this white paper, discover how Fortify Security Assistant empowers developers to take responsibility for their own code by finding and fixing application security defects during the coding process.
Posted: 29 Jan 2019 | Published: 31 Aug 2018

Micro Focus

Circumventing a Blacklist to Exploit Cross-Site Scripting
sponsored by WhiteHat Security
PRODUCT OVERVIEW: Discover how a cross-site scripting (XSS) vulnerability was found during an assessment of a financial services website and how the tester managed to get around the malicious script.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

WhiteHat Security

2018 Security Implications of Digital Transformation Report
sponsored by Fortinet, Inc.
RESEARCH CONTENT: While the potential of digital transformation is exciting from a business perspective, changes stemming from it can create anxiety for the cybersecurity team. In Fortinet's 2018 Security Implications of Digital Transformation Survey, examine the state of cybersecurity in organizations around the world from the lens of digital transformation.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

Fortinet, Inc.

How to Automate an API Security Program
sponsored by Data Theorem
WEBCAST: Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.
Posted: 10 Jun 2019 | Premiered: Jun 10, 2019

Data Theorem

Presentation Transcript: Reduce the Cost of Being Secure by Building Security into your Development Process
sponsored by IBM
PRESENTATION TRANSCRIPT: In this presentation transcript, explore the importance of application security and the business case for building security in from the start.  Find out how your development tools can assist you in meeting your security objectives.
Posted: 09 Dec 2011 | Published: 09 Dec 2011

IBM

An Integrated Approach to Managing Application Security
sponsored by IBM
WHITE PAPER: This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

WAN Optimization: Expert Guidelines to Management and Security
sponsored by SearchNetworking.com
EBOOK: What is the next step for WAN management? This expert guide explains why WAN optimization is now the norm and provides guidelines for an all-in-one strategy to minimize cost, complexity, and risk within your organization.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

SearchNetworking.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement