IT Management  >   Systems Design and Development  >   Application Development  >  

Developing Secure Applications

RSS Feed   
Developing Secure Applications Reports
 
Evolving DevOps to support security – perspectives from the Puppet Labs State of DevOps report
sponsored by ServiceNow
WHITE PAPER: In this State of DevOps report, explore recent research findings from Puppet Labs and ServiceNow as they home in on DevOps trends with an emphasis on security. Read the key takeaways here.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

ServiceNow

Circumventing a Blacklist to Exploit Cross-Site Scripting
sponsored by WhiteHat Security
PRODUCT OVERVIEW: Discover how a cross-site scripting (XSS) vulnerability was found during an assessment of a financial services website and how the tester managed to get around the malicious script.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

WhiteHat Security

Creating a DevSecOps Culture in Your Company
sponsored by Checkpoint Software Technologies
EBOOK: As organizations continue to embrace cloud architectures as their preferred business environment, security methods need to change to reflect the needs of an evolving landscape. In this e-book, you’ll learn more about why organizations are embracing DevSecOps and the Shared Responsibility Model to meet cloud security challenges.
Posted: 21 May 2020 | Published: 21 May 2020

Checkpoint Software Technologies

What is the Difference Between SCCM and WSUS?
sponsored by Automox
RESOURCE: What is the difference between SCCM and WSUS? Both are patch management solutions offered by Microsoft, but there are some significant differences between the two. Tap into this blog to learn more.
Posted: 09 Apr 2020 | Published: 09 Apr 2020


Using Security Instrumentation to Analyze and Protect Software
sponsored by Contrast Security
WHITE PAPER: Instrumentation-based application testing can help improve security without skilled security staff or the need to change code. It can also help developers push code into production much faster than formal processes for testing and approval. Dive into this white paper to learn more about the advantages of using instrumentation to automate AppSec.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

Contrast Security

E-Guide: Expert insights to application security testing and performance
sponsored by SearchSecurity.com
EGUIDE: Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle.
Posted: 11 Nov 2011 | Published: 11 Nov 2011

SearchSecurity.com

Top 7 Reasons Why Organizations Choose WhiteHat Security
sponsored by WhiteHat Security
RESOURCE: In this infographic, find out the top 7 reasons organizations choose to work with WhiteHat Security.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

WhiteHat Security

The Secure DevOps Imperative: 3 Best Practices for Securing Cloud Applications
sponsored by Trend Micro
WHITE PAPER: The rapid adoption of cloud technologies has required a unified development and deployment approach with increased involvement of the cybersecurity team. Given the amount of sensitive data residing in cloud applications, incorporating security is critical. Download this white paper to unlock 3 best practices for securing cloud native applications.
Posted: 26 Feb 2020 | Published: 30 Nov 2019

Trend Micro

Application Security Advice: Stop Threats before They Start
sponsored by SearchSoftwareQuality.com
EBOOK: Too often, application developers treat security as an afterthought, and they believe last-minute security testing will be enough to safeguard their applications from threats. Consult this expert handbook to learn how to build in security at every stage of the application lifecycle.
Posted: 20 May 2014 | Published: 20 May 2014

SearchSoftwareQuality.com

State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info