IT Management  >   Systems Design and Development  >   Application Development  >  

SDL

RSS Feed   
SDL Reports
 
CW APAC - November 2019: Expert advice on container security
sponsored by ComputerWeekly.com
EZINE: For all the promises of containers, changes in architectureand practices associated with the technology bring newchallenges and opportunities. In this handbook, Computer Weekly looks at the security challenges associated with container technology. Read the issue now.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

ComputerWeekly.com

AppSec Stats Flash Podcast EP.1 - AppSec Insights + Shared Responsibility = Secure Applications
sponsored by WhiteHat Security
VIDEO: In this episode of the AppSec Stats Flash podcast, join Setu Kulkarni, VP of Corporate Strategy and Business Development and Zach Jones, Sr. Director Security Research, as they dive into the first 3 key metrics of application security and explore the topic of shared responsibility for security. Listen here.
Posted: 10 Feb 2021 | Premiered: 10 Feb 2021

WhiteHat Security

Beating web application security threats
sponsored by SearchSecurity.com
EGUIDE: Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability.
Posted: 14 Nov 2011 | Published: 31 Oct 2011

SearchSecurity.com

Zeronorth, Bringing End-to-end Clarity To Application Security
sponsored by ZeroNorth
WHITE PAPER: The explosion of software applications is producing an exponential increase in the overall application attack surface. Luckily, security automation platforms are designed to prevent this problem exactly. Learn how a security automation platform can help your organization stay secure here.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

ZeroNorth

VMs vs. containers: Which is better for security?
sponsored by ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 02 Oct 2019 | Published: 02 Oct 2019

ComputerWeekly.com

Secure your GraphQL & gRPC APIs
sponsored by Traceable
VIDEO: In this webinar, security experts discuss how optimal application and API architecture requires the use of new protocols. Tune in as they cover the use of Traceable for cloud-native application visibility, protecting external and internal APIs from OWASP Top 10 risks, and more.
Posted: 12 Feb 2021 | Premiered: 12 Feb 2021

Traceable

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Beating Web Application Security Threats
sponsored by Thawte Inc.
EBOOK: The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats.
Posted: 18 Mar 2010 | Published: 18 Mar 2010

Thawte Inc.

The Modern Mobility E-Zine: An Exclusive Look at Enterprise Mobility
sponsored by SearchMobileComputing
EZINE: Access this e-zine to learn how the role of DevOps is changing as enterprise mobility matures. Read on here to see how fusing mobile app development and management can change the way IT delivers mobile information to users.
Posted: 14 Apr 2015 | Published: 13 Apr 2015

SearchMobileComputing

Untangling Work and Personal Data with Enterprise MAM
sponsored by IBM
EBOOK: This exclusive 3-part e-book explains how and why you should use mobile app management (MAM) to control enterprise apps. Inside, discover how you can securely enable successful enterprise mobility, and get an inside look at a MAM comparison: app wrapping vs. containerization.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

IBM
 
Browse by Report Type:
SDL White Papers | SDL Multimedia | SDL IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences