IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Application Development

RSS Feed   
ALSO CALLED: Security Development Lifecycle, SDL, Developing Secure Applications, Coding Vulnerabilities, Secure Software Development, Secure Programming, Security-related Design
DEFINITION: Ability to maintain security across the application development lifecycle.
Secure Application Development Reports
1 - 25 of 95 Matches Previous Page  |  Next Page
Vulnerability Management and DevSecOps with CI/CD
sponsored by CircleCI
WHITE PAPER: While DevOps has simplified software builds, testing, and deployment, it fails to address a vital issue: security and vulnerability management. In this guide, learn how to integrate strong security practices into your DevOps pipeline. Save the guide here.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

CircleCI

Enable and Educate Your Team
sponsored by WhiteHat Security
WHITE PAPER: The reality for many companies is that they’re only at risk for breaches from common, easily-preventable attacks because their teams didn’t get the right security training. Check out the WhiteHat Security eLearning Platform program here to see if it’s the right fit for your teams.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

WhiteHat Security

One of The World’s Largest Fast-Food Chains Secures Business-Critical Applications with WhiteHat Security
sponsored by WhiteHat Security
CASE STUDY: In this case study, learn how one of the world’s largest fast-food chains succeeded in implemented ongoing testing and monitoring of their business-critical applications to proactively defend themselves from application-specific attacks. Get the details here.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

WhiteHat Security

Security in the Fast Lane: Day 2
sponsored by WhiteHat Security
WEBCAST: When and where do you think about security? In this exclusive webinar series, join WhiteHat Security and TIBCO experts as they discuss what it means to be in the fast lane of developing and delivering modern—and secure—SaaS products. Tune in to the conversation here.
Posted: 14 Jan 2021 | Premiered: Sep 30, 2020

WhiteHat Security

Enabling a SASE Approach to Private Application Access and Security
sponsored by Axis Security
WHITE PAPER: Enterprises still lag in delivering and securing private applications to business users due to legacy security and access methods. Some businesses bring their legacy apps to the cloud, but these ‘cloudified’ apps still tend to underperform. Stop living in the past – check out this white paper on the Application Access Cloud by Axis Security.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

Get a Head Start on Your Application Security Program with Open Source Tools
sponsored by ZeroNorth
WHITE PAPER: In today’s volatile threat landscape and economy, no company can afford to release vulnerable software. Businesses should leverage existing resources—such as open source tools—to create a strategic, comprehensive application security program. Find out how to get a head start on your application security program using open source code in this guide.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

ZeroNorth

ZeroNorth, Bringing End-to-End Clarity to Application Security
sponsored by ZeroNorth
WHITE PAPER: The explosion of software applications is producing an exponential increase in the overall application attack surface. Luckily, security automation platforms are designed to prevent this problem exactly. Learn how a security automation platform can help your organization stay secure here.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

ZeroNorth

5 Powerful Solutions for Scaling Application Security
sponsored by ZeroNorth
WHITE PAPER: Inside this State of Application Security report, find the most up-to-date findings, discover the 5 most powerful solutions for scaling application security, and explore how the infamously rocky relationship between development and security managed throughout 2020. Download the report here.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

ZeroNorth

Are Quality and Security Synonymous in Software?
sponsored by ZeroNorth
WHITE PAPER: The biggest fear for many companies today is making front-page news about a massive and expensive data breach. Learn how to fill any missing gaps between quality and security in this extensive report, so that your company only makes front-page news in a positive light. Download the report here.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

ZeroNorth

Application Security with Fortify
sponsored by Micro Focus
WEBCAST: With more apps and shorter release cycles, it gets harder and harder for your app dev team to protect you from cybercriminals constantly testing your applications for weaknesses. That’s why organizations are adopting holistic application security solutions. Watch this video to learn about application security with Fortify.
Posted: 23 Dec 2020 | Premiered: Dec 23, 2020

Micro Focus

Application Evolution
sponsored by WhiteHat Security
VIDEO: In this video, learn how the nature of IT security is changing and what that means for the roles and expertise required inside your organization, so you can successfully secure your applications – and your future.
Posted: 14 Dec 2020 | Premiered: 14 Dec 2020

WhiteHat Security

Intro to Continuous Security on AWS
sponsored by AWS Mphasis/Stelligent
WHITE PAPER: Often, organizations moving to the cloud are left to choose between giving up agility and pace of innovation in lieu of security or accepting greater risk. However, through continuous security, you can validate your cloud infrastructure security across an organization. This white paper details 4 stages of continuous security for AWS resources.
Posted: 11 Dec 2020 | Published: 11 Dec 2020

AWS Mphasis/Stelligent

Whitehat Security Webinar
sponsored by WhiteHat Security
WEBCAST: Dynamic Application Security Testing (DAST) enables AppSec teams with the ability to assess and address the actual risk of their applications – providing critical security capabilities to support DevSecOps initiatives. Watch this webinar to learn more about DAST and how it can support your AppSec goals.
Posted: 10 Dec 2020 | Premiered: Dec 10, 2020

WhiteHat Security

The State of Application Security
sponsored by WhiteHat Security
WEBCAST: Attackers continue to take advantage of application flaws to compromise organizations and put their customers at risk. This means that as much as Dev teams prioritize faster release cycles, it’s important that they don’t overlook security. In this WhiteHat webinar, examine the state of application security and what you can do to stay protected.
Posted: 09 Dec 2020 | Premiered: Dec 9, 2020

WhiteHat Security

Enable and Educate Your Team
sponsored by WhiteHat Security
DATA SHEET: Too many cyberattacks come from subpar employee enablement and/or security misconfigurations. WhiteHat is looking to resolve this issue with their eLearning Platform, designed to educate your users on common application security threats, best practices, incident remediation, and more – read on to learn more about the platform.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

WhiteHat Security

Are Devops And Security Mutually Exclusive?
sponsored by Puppet
WHITE PAPER: IBM research has found that it costs 6 times more to fix a bug found during implementation than to fix one identified during design. Accelerating software delivery has obvious implications for your security practice. In this guide, learn how to make DevOps assist your security agenda, rather than threaten it.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Puppet

DevSecOps: Integrating Security into the Enterprise Software Delivery Lifecycle
sponsored by Puppet
WEBCAST: Once you get involved in DevOps practices, it doesn’t take long for 4 questions to arise. Here, explore the 4 questions—and, of course, their answers—while learning how you can make your DevOps practice as secure as possible.
Posted: 07 Dec 2020 | Premiered: Dec 7, 2020

Puppet

Mobile Security App-titude
sponsored by WhiteHat Security
WEBCAST: View Mobile Security App-titude: Best Practices for Secure App Design and Data Privacy to learn about PII – what data is being collected, how sensitive information can be compromised, how you can protect user data, and more.
Posted: 24 Nov 2020 | Premiered: Nov 24, 2020

WhiteHat Security

Reduce API Security Risks with Automated and Continuous API Scanning
sponsored by WhiteHat Security
WEBCAST: Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent history. How do we reduce API security risks? View this webcast to learn why testing may be the key.
Posted: 20 Nov 2020 | Premiered: Jul 15, 2020

WhiteHat Security

DevSecOps Framework – Technical Deep Dive
sponsored by WhiteHat Security
WEBCAST: Organizational infrastructure is becoming more and more vulnerable, and as a result, development teams are searching for ways to securely develop, build and deploy business-driving applications. So, what can these teams do to get started? They can begin by watching this webcast to learn the keys to a successful DevSecOps implementation.
Posted: 16 Nov 2020 | Premiered: Nov 16, 2020

WhiteHat Security

State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: In their 11th official State of Software Security report, Veracode looks at what kind of impact the decisions developers make have on software security. Explore the top security concerns of the year—and learn how to navigate around them—here.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Veracode, Inc.

Container Security Vulnerabilities: How to Avoid Them and Stay Secure
sponsored by TechTarget
RESOURCE: Inside our new Essential Guide to Container Security, discover: What's changed in container security since the initial Docker release, 5 types of container and orchestrator vulnerabilities, and lessons learned from a past Kubernetes vulnerability. To gain FREE access to this expert guide, please complete our online survey.
Posted: 27 Oct 2020 | Published: 01 Nov 2020

TechTarget

AI, CWPPs & DevSecOps: The Future of Cybersecurity
sponsored by Rezilion
EGUIDE: Artificial intelligence, DevSecOps and cloud security have all emerged as transformative technologies within the cybersecurity industry. This e-guide explores each of these areas by providing 3 expert articles. Read on to unlock your copy.
Posted: 25 Sep 2020 | Published: 01 Sep 2020

Rezilion

How to Secure APIs at DevOps Speed
sponsored by Contrast Security
WHITE PAPER: API vulnerabilities are becoming the most popular target for attacks, as traditional security measures often fail to protect APIs. Luckily, API security isn’t as far away as you think. In this eBook, learn how to begin an instrumentation-based approach to DevOps and API security.
Posted: 20 Aug 2020 | Published: 20 Aug 2020

Contrast Security

Auth0 Platform Introduction
sponsored by Auth0
WEBCAST: This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.
Posted: 02 Jul 2020 | Premiered: Jul 2, 2020

Auth0
1 - 25 of 95 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info