IT Management  >   Systems Design and Development  >   Application Development  >  

SDL

RSS Feed   
SDL Reports
 
Nexus Innovator
sponsored by Sonatype
WHITE PAPER: DevSecOps is such a new and evolving practice that it is helpful to hear from someone who can articulate, “Yes. DevSecOps works in theory AND in practice.” In this guide, explore the four-part DevSecOps evolution and how organizations can practically apply these practices to foster innovation and quality development.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Sonatype

Perimeter Security Noise Leaves Applications Vulnerable to Attacks
sponsored by Contrast Security
WHITE PAPER: Learn how you can get AppSec protection that can compensate with the necessary visibility, accuracy, scalability, and ease of deployment to keep pace with modern application vulnerabilities without generating false positives and false negatives.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

Contrast Security

A Comprehensive Approach to DevSecOps
sponsored by Contrast Security
WHITE PAPER: More than half of organizations in a recent study say that their security team has reached a tipping point where the number of security tools in place has adversely impacted their security posture and increased risk. Stuck in the AppSec tool swamp? Learn about a unified AppSec platform that can alleviate this problem.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

Contrast Security

Computer Weekly buyer's guide to mobile app development
sponsored by ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

ComputerWeekly.com

Best Practices for Successful Transformation Journey with Automation
sponsored by Red Hat
VIDEO: In this round table discussion, join leaders at Andorra Telecom, Rabobank and Discovery as they share best practices and success stories regarding their digital transformation and journey towards automation.
Posted: 24 Jul 2020 | Premiered: 05 Jun 2020

Red Hat

Application Encryption and Security
sponsored by NetLib Security
WHITE PAPER: Adequate application security is defined by protection against external threats alongside the ability to detect and prevent internal vulnerabilities. While this may sound simple, the average organization has around 50% of apps that remain vulnerable. So, what is the solution to this problem? Read on to find out.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

NetLib Security

The Four Biggest Challenges to Keeping Modern Applications Secure
sponsored by Radware
WHITE PAPER: According to a recent study, just 33% of organizations feel their web application firewall (WAF) addresses all application-targeted threats. While implementing a WAF is an important starting point for ensuring the protection of modern apps, there are other key challenges and threats to consider. Download this report to learn more.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

Radware

How to Deliver DevSecOps
sponsored by Veracode, Inc.
EGUIDE: Developer responsibilities are changing to include security—but DevSecOps doesn't have to be a drag. In this exclusive e-Guide, find 3 articles that explore how developers can implement security practices without adding to their workloads or their stress.
Posted: 11 May 2020 | Published: 11 May 2020

Veracode, Inc.

CW APAC - November 2019: Expert advice on container security
sponsored by ComputerWeekly.com
EZINE: For all the promises of containers, changes in architectureand practices associated with the technology bring newchallenges and opportunities. In this handbook, Computer Weekly looks at the security challenges associated with container technology. Read the issue now.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

ComputerWeekly.com

The Essential Guide for Threat Intelligence Services: What to Look For
sponsored by SearchSecurity.com
EBOOK: This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

SearchSecurity.com
 
Browse by Report Type:
SDL White Papers | SDL Multimedia | SDL IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info