IT Management  >   Systems Design and Development  >   Application Development  >  

SDL

RSS Feed   
SDL Reports
 
The Rise of the Open Source Program Office
sponsored by Fossa
WHITE PAPER: Open source software is fundamentally different from proprietary software. Often, different teams use and/or build open source differently. Because of this variability, it needs to be approached differently. Managing this strategy is the job of the OSPO (Open Source Program Office). But what is an OSPO and how do you build one? Read on to find out.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Fossa

CISO’s Guide to DevOps: Learning to Cooperate with DevOps
sponsored by ShieldX
WHITE PAPER: Today’s CISOs are under pressure to establish data security protocols while enabling an agile development environment. The following guide is a checklist designed to help CISOs with the issue of incorporating security into DevOps. Read on for tips and tricks on improving how you work with DevOps.
Posted: 27 Jan 2020 | Published: 31 Oct 2018

ShieldX

Securing APIs at DevOps Speed
sponsored by Contrast Security
WEBCAST: When APIs are insecure, we still have something to work with—and the sooner we’re aware of the security threats, the better. In this webinar, learn about the different approaches to API security and how API security can fit into DevOps methodologies for the best results. Watch the webinar here.
Posted: 17 Apr 2020 | Premiered: Apr 17, 2020

Contrast Security

Application security testing: Protecting your application and data
sponsored by SearchSecurity.com
EBOOK: Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.
Posted: 07 Nov 2011 | Published: 07 Nov 2011

SearchSecurity.com

Identify and Mitigate Threats to OpenShift Container-Based Infrastructure with Red Hat Training
sponsored by Red Hat
WEBCAST: How are you keeping your containers secure? In this Red Hat OpenShift webinar, learn about securing both containers and container orchestration platforms, from communication to access control to monitoring practices.
Posted: 27 Apr 2020 | Premiered: Apr 27, 2020

Red Hat

Achieving CloudSecOps Maturity
sponsored by DivvyCloud
WHITE PAPER: When it comes to establishing cloud security operations (CloudSecOps) methods, organizations tend to begin with in-house solutions. In this white paper, discover the limitations of in-house solutions, and realize when it’s time to look elsewhere.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

DivvyCloud

E-Guide: Integrating security into the ALM lifecycle
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, readers will learn the risks businesses take by not taking security measures seriously and what can be done to help integrate security with application lifecycle management.
Posted: 21 Nov 2011 | Published: 16 Nov 2011

SearchSecurity.com

Application Encryption and Security
sponsored by NetLib Security
WHITE PAPER: Adequate application security is defined by protection against external threats alongside the ability to detect and prevent internal vulnerabilities. While this may sound simple, the average organization has around 50% of apps that remain vulnerable. So, what is the solution to this problem? Read on to find out.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

NetLib Security

An Integrated Approach to Managing Application Security
sponsored by IBM
WHITE PAPER: This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

Podcast: How Security is well suited for Agile development
sponsored by IBM
PODCAST: Tune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and why how security is linked to the software development lifecycle.
Posted: 09 Jun 2011 | Premiered: Jun 7, 2011, 13:30 EDT (17:30 GMT)

IBM
 
Browse by Report Type:
SDL White Papers | SDL Multimedia | SDL IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info