IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Application Development

RSS Feed   
ALSO CALLED: Security Development Lifecycle, SDL, Developing Secure Applications, Coding Vulnerabilities, Secure Software Development, Secure Programming, Security-related Design
DEFINITION: Ability to maintain security across the application development lifecycle.
Secure Application Development Reports
1 - 25 of 77 Matches Previous Page  |  Next Page
Shifting Security to the Left to Protect the Enterprise
sponsored by Aporeto
WHITE PAPER: This report sets out the thinking behind DevSecOps and explains how to protect data and services, assure privacy and trust, and remain compliant, without losing the ability to innovate and scale new software solutions. Read on to learn how you can combat the challenges of balancing security and innovation.
Posted: 08 Oct 2019 | Published: 08 Oct 2019

Aporeto

VMs vs. containers: Which is better for security?
sponsored by ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 02 Oct 2019 | Published: 02 Oct 2019

ComputerWeekly.com

A DevSecOps Guide
sponsored by Aqua Security
WHITE PAPER: After understanding the value of a DevOps mindset, making the cultural shift and reaping the benefits, many companies are aiming for the next big step: integrating development, operations, and security into one organization. In this white paper, learn how to successfully implement DevSecOps in your organization.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Aqua Security

Using the AWS Well-Architected Framework to Support DevSecOps
sponsored by nClouds
RESOURCE: In this blog, discover strategies for applying guidelines from the AWS Well-Architected Framework in a low-friction way to make it easier to prioritize security and advance your DevSecOps approach.
Posted: 25 Sep 2019 | Published: 19 Nov 2018

nClouds

The Benefits of a Software Defined Secure Branch with Versa Networks
sponsored by Verizon
WHITE PAPER: Adopting software defined secure branch gives organizations a network landscape that is built for the digital enterprises of today. In this white paper, discover the benefits of a software defined secure branch with Versa Networks.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

Verizon

Getting Started with DevSecOps
sponsored by ZeroNorth
WEBCAST: Collaboration between development and security teams is key to DevSecOps transformation and involves both cultural and technological shifts. In this webcast, Andrei Bezdedeanu, ZeroNorth VP of Engineering, discusses how to get started with DevSecOps and the resulting benefits.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

ZeroNorth

Establish Secure DevOps Practices
sponsored by Centrify Corporation
WEBCAST: The introduction of microservices, container-based architectures, and DevOps practices have led to a revolution in software development. However, security can be an afterthought when adopting these. In this webcast, explore DevSecOps and how it can help your organization take the "fast lane" through security into production.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

Automated Security at the Speed of DevOps
sponsored by Trend Micro, Inc.
WHITE PAPER: As organizations implement DevOps on AWS, they need to understand the security implications. In this white paper, explore the main challenges businesses face at the intersection of DevOps and security. Also, learn best practices for integrating security within your development process from the start.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Trend Micro, Inc.

6 Steps to Container Security
sponsored by Trend Micro, Inc.
WHITE PAPER: Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.
Posted: 31 Jul 2019 | Published: 31 Mar 2019

Trend Micro, Inc.

Mastering Coverage
sponsored by Contrast Security
WHITE PAPER: When it comes to application security testing, "coverage" is the third rail – a controversial topic for vendors and a seemingly intractable problem for practitioners – but it is the most critical part of your application security strategy. In this white paper, explore a framework for evaluating your application security testing coverage.
Posted: 24 Jul 2019 | Published: 31 Jul 2018

Contrast Security

Introduction to IAST
sponsored by Contrast Security
WHITE PAPER: Interactive Application Security Testing (IAST) is a technology for automatically identifying and diagnosing software vulnerabilities in applications and APIs. IAST continuously monitors your applications for vulnerabilities from within. In this white paper, learn everything you need to know about IAST.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

Contrast Security

The DevOps-Ready Security Program
sponsored by Contrast Security
WHITE PAPER: Extending DevOps to your software application security team shifts security from being a bottleneck to an enabler. Successful security teams take a risk-based approach to enable product development without being a blocker or being left behind. In this white paper, explore 6 tips for an executive to bring security into the DevOps era.
Posted: 23 Jul 2019 | Published: 23 Jul 2019

Contrast Security

Real-World Customer with Secure Application Infrastructure
sponsored by VMware
WHITE PAPER: In this white paper, learn about secure application infrastructure, which architects security controls directly into the networks and endpoints where applications live—enabling protection to follow apps wherever they go. Also explore features of secure application infrastructure, as well as use cases for education, healthcare and more.
Posted: 18 Jun 2019 | Published: 31 Jul 2018

VMware

Qualcomm's Alex Gantman on Bug Bounties
sponsored by HackerOne
CASE STUDY: Qualcomm's technologies are powering the world of connected devices. But since Qualcomm's technology isn't the end product, it's difficult to determine the root of a device's vulnerability. In this case study, see what the VP of Engineering at Qualcomm, had to say about the company's approach to bug bounties and hacker-powered security.
Posted: 14 Jun 2019 | Published: 22 Jun 2017

HackerOne

How to Automate an API Security Program
sponsored by Data Theorem
WEBCAST: Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.
Posted: 10 Jun 2019 | Premiered: Jun 10, 2019

Data Theorem

2019 Cyberthreat Defense Report
sponsored by Gigamon
ANALYST REPORT: In this 2019 Cyberthreat Defense Report, learn about the latest trends for the frequency & impact of cyberattacks, the adequacy of organizational security postures, the greatest barriers to establishing strong defenses, and more.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

Gigamon

A Guide to Joining DevOps and Security
sponsored by Trend Micro, Inc.
EGUIDE: If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
Posted: 09 May 2019 | Published: 03 May 2019

Trend Micro, Inc.

RingCentral Case Study
sponsored by Data Theorem
CASE STUDY: RingCentral did not have the experts or a scalable platform to provide security coverage for their mobile apps. However, they have a requirement with their customers and partners to perform third-party security testing for all of their apps. In this case study, learn how RingCentral was able to address this issue using Data Theorem's App Secure.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Data Theorem

Automate Compliance Audits Without the Staff
sponsored by Data Theorem
WEBCAST: Data security and privacy are top of mind issues for security leaders and corporate boards. However, Agile and DevOps development models are moving too quickly for manual security assurance and compliance validation. In this webcast, learn how to automate the compliance and audit process.
Posted: 09 Apr 2019 | Premiered: Feb 1, 2019

Data Theorem

Leveraging the Agility of DevOps Processes to Secure Hybrid Clouds
sponsored by Trend Micro, Inc.
WHITE PAPER: In this white paper, explore how hybrid clouds bring changes to business models, methodologies, and technologies, the intersection of which represents an opportunity to efficiently improve an organization's cybersecurity while also enabling the speed of business.
Posted: 02 Apr 2019 | Published: 30 Apr 2018

Trend Micro, Inc.

The Beginners' Guide to Hacker-Powered Security
sponsored by HackerOne
WHITE PAPER: Leveraging the wisdom and power of the vast white-hat hacker community is a new security expectation. In this white paper, learn the best practices for starting and running effective disclosure and bug bounty programs, and how to integrate hacker-powered security into your organization.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

HackerOne

Application Security and How to Improve it
sponsored by WhiteHat Security
WHITE PAPER: UBM conducted an online survey to explore common trends and challenges in app security, and to understand how security and development teams can work together to close these gaps. Click here for an inside look at the survey results.
Posted: 06 Mar 2019 | Published: 31 Dec 2018

WhiteHat Security

Circumventing a Blacklist to Exploit Cross-Site Scripting
sponsored by WhiteHat Security
PRODUCT OVERVIEW: Discover how a cross-site scripting (XSS) vulnerability was found during an assessment of a financial services website and how the tester managed to get around the malicious script.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

WhiteHat Security

Static Analysis and the Truth About False Positives
sponsored by WhiteHat Security
PRODUCT OVERVIEW: Learn the truth behind false positives and how a source code scanning technology that is not programmed with assumptions can help your application security program today.
Posted: 04 Mar 2019 | Published: 04 Mar 2019

WhiteHat Security

Why Websites Stay Vulnerable: And What You Can Do About It
sponsored by WhiteHat Security
WEBCAST: There have been a number of data breaches in the news recently due to website vulnerabilities. In order to ensure your business isn't breached, incorporate security into your development process. In this webcast, explore key considerations for securing your web applications.
Posted: 01 Mar 2019 | Premiered: Mar 1, 2019

WhiteHat Security
1 - 25 of 77 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement