IT Management  >   Systems Design and Development  >   Application Development  >  

SDL

RSS Feed   
SDL Reports
 
Mature Your Appsec Program
sponsored by Micro Focus
WHITE PAPER: Download this white paper for concrete strategies that can help mature your AppSec program, based on your organization’s needs.
Posted: 04 Feb 2021 | Published: 04 Feb 2021

Micro Focus

Reduce API Security Risks with Automated and Continuous API Scanning
sponsored by WhiteHat Security
WEBCAST: Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent history. How do we reduce API security risks? View this webcast to learn why testing may be the key.
Posted: 20 Nov 2020 | Premiered: Jul 15, 2020

WhiteHat Security

Fortify On Demand Mobile Application Security Testing
sponsored by Micro Focus
BROCHURE: Application security becomes more and more important as organizations embrace a growing population of applications. Protecting these applications is especially critical throughout DevOps lifecycles. Read this brochure to see how Fortify on Demand supports DevOps efforts to protect and manage applications.
Posted: 05 Feb 2021 | Published: 05 Feb 2021

Micro Focus

One of The World’s Largest Fast-Food Chains Secures Business-Critical Applications with WhiteHat Security
sponsored by WhiteHat Security
CASE STUDY: In this case study, learn how one of the world’s largest fast-food chains succeeded in implemented ongoing testing and monitoring of their business-critical applications to proactively defend themselves from application-specific attacks. Get the details here.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

WhiteHat Security

How to Deliver DevSecOps
sponsored by Veracode, Inc.
EGUIDE: Developer responsibilities are changing to include security—but DevSecOps doesn't have to be a drag. In this exclusive e-Guide, find 3 articles that explore how developers can implement security practices without adding to their workloads or their stress.
Posted: 11 May 2020 | Published: 11 May 2020

Veracode, Inc.

AI, CWPPs & DevSecOps: The Future of Cybersecurity
sponsored by Rezilion
EGUIDE: Artificial intelligence, DevSecOps and cloud security have all emerged as transformative technologies within the cybersecurity industry. This e-guide explores each of these areas by providing 3 expert articles. Read on to unlock your copy.
Posted: 25 Sep 2020 | Published: 01 Sep 2020

Rezilion

Securing the Entire Software Development Pipeline with Veracode Static Analysis
sponsored by Veracode, Inc.
WHITE PAPER: Developers need security testing solutions that can keep the pace with rapid, agile development processes. Traditional AppSec solutions can cause development to stall and delay the release of software. In this guide, learn how static analysis solutions can secure applications without hindering fast development.
Posted: 06 May 2020 | Published: 06 May 2020

Veracode, Inc.

DevSecOps Framework – Technical Deep Dive
sponsored by WhiteHat Security
WEBCAST: Organizational infrastructure is becoming more and more vulnerable, and as a result, development teams are searching for ways to securely develop, build and deploy business-driving applications. So, what can these teams do to get started? They can begin by watching this webcast to learn the keys to a successful DevSecOps implementation.
Posted: 16 Nov 2020 | Premiered: Nov 16, 2020

WhiteHat Security

Application Security Advice: Stop Threats before They Start
sponsored by SearchSoftwareQuality.com
EBOOK: Too often, application developers treat security as an afterthought, and they believe last-minute security testing will be enough to safeguard their applications from threats. Consult this expert handbook to learn how to build in security at every stage of the application lifecycle.
Posted: 20 May 2014 | Published: 20 May 2014

SearchSoftwareQuality.com

The Essential Guide for Threat Intelligence Services: What to Look For
sponsored by SearchSecurity.com
EBOOK: This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

SearchSecurity.com
 
Browse by Report Type:
SDL White Papers | SDL Multimedia | SDL IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info