IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Application Development

RSS Feed   
ALSO CALLED: Security Development Lifecycle, SDL, Developing Secure Applications, Coding Vulnerabilities, Secure Software Development, Secure Programming, Security-related Design
DEFINITION: Ability to maintain security across the application development lifecycle.
Secure Application Development Reports
1 - 25 of 79 Matches Previous Page  |  Next Page
2018 Global Study on Application Security
sponsored by Arxan
RESEARCH CONTENT: Ponemon Institute conducted a survey to understand the risk that unprotected applications pose to businesses when running in unsecured environments and how organizations are addressing this risk in practice. In this research report, learn about key findings from the survey.
Posted: 14 Feb 2019 | Published: 31 May 2018

TOPICS: 
Arxan

Market Guide for Application Shielding
sponsored by Arxan
RESEARCH CONTENT: Protecting applications that run within untrusted environments is crucial as mobile, IoT and modern web applications migrate software logic to the client side. Application shielding is well-suited to protect consumer mobile apps. Download this Gartner research report to learn more about application shielding.
Posted: 14 Feb 2019 | Published: 27 Jun 2018

TOPICS: 
Arxan

Securing Web Applications in Container-Based Environments
sponsored by Fortinet, Inc.
WHITE PAPER: A lack of dynamic security capabilities that can keep pace with the ever-changing nature of DevOps environments leaves organizations exposed to risks. In this white paper, learn about Fortinet's WAF that is designed to protect web-based applications and internet-facing data from threats within container-based environments.
Posted: 14 Feb 2019 | Published: 17 Nov 2018

TOPICS: 
Fortinet, Inc.

Securing Web Apps From the Inside Out
sponsored by Arxan
WHITE PAPER: To protect against threats to JavaScript apps, organizations need more than just WAFs, they need a way to secure apps from the inside out, starting with code. Download this white paper to learn about a multilayered approach that can help protect your apps before it's too late.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Arxan

A New Security Strategy that Protects the Organization When Work Is Happening from Anywhere
sponsored by Citrix
RESOURCE: The concept of the "digital perimeter" has changed dramatically. Protecting the perimeter by building a wall too keep the bad guys out is no longer appropriate because of mobility, the cloud and constant remote access to internal systems. In this resource, learn how to better secure your organization against increasingly sophisticated attacks.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

TOPICS: 
Citrix

Secure App Development: Success Story
sponsored by Micro Focus
WEBCAST: Tune into this webcast to learn about a security tool that was designed for developers and allows developers to jump into the tool at any point to create a secure software development lifecycle program.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019

TOPICS: 
Micro Focus

Change Healthcare
sponsored by Micro Focus
CASE STUDY: Applications developed by Change Healthcare are used to process millions of healthcare transactions. Therefore, it is essential for the organization to ensure all data is secure. In this case study, learn how Fortify on Demand and Micro Focus Fortify WebInspect provided an affordable and effective means of finding and fixing vulnerabilities.
Posted: 30 Jan 2019 | Published: 31 Aug 2018

TOPICS: 
Micro Focus

Build Application Security into the Entire SDLC
sponsored by Micro Focus
WHITE PAPER: 84% of security breaches exploit vulnerabilities at the application layer. And, software security is still an afterthought for developers. In this white paper, discover how Fortify Security Assistant empowers developers to take responsibility for their own code by finding and fixing application security defects during the coding process.
Posted: 29 Jan 2019 | Published: 31 Aug 2018

TOPICS: 
Micro Focus

Corelight Webcast: New SIEM on the Block -- Meet Humio
sponsored by CoreLight
WEBCAST: Bro network security monitoring is an open source tool. It turns raw network traffic into comprehensive network logs organized by protocol, with key fields extracted specifically for security use cases. In this webcast, watch a demo to see how Corelight's technical integration with Humio allows you to economically monitor all your network traffic.
Posted: 28 Jan 2019 | Premiered: Aug 21, 2018

TOPICS: 
CoreLight

Hackers Can Strike Your Device Before You Even Open The Box
sponsored by Lenovo & Microsoft
RESOURCE: Criminals are increasingly targeting supply chains to introduce vulnerabilities into devices during manufacturing and prior to delivery. Lenovo's device-level security begins at product development, with robust design features to keep users safe from today's privacy threats. Download this guide to learn more about device-level security.
Posted: 25 Jan 2019 | Published: 25 Jan 2019

TOPICS: 
Lenovo & Microsoft

The 2019 Security Strategy
sponsored by Cloudflare
VIDEO: How are you planning to secure your employees, your company, and your customers in 2019? Watch this webinar to hear from Cloudfare CSO Joe Sullivan on the core strategies he uses to help protect Cloudfare, and—as a result—its 12M domains that rely on it for security and performance.
Posted: 22 Jan 2019 | Premiered: 17 Jan 2019

TOPICS: 
Cloudflare

Enforcing Immutability & Least Privilege to Secure Containerized Applications on Openshift
sponsored by Aqua Security
WEBCAST: In this webinar, learn more on how you can secure your containers with an approach that enforces immutability and least privilege.
Posted: 18 Jan 2019 | Premiered: Jan 16, 2019

TOPICS: 
Aqua Security

Compliance Guide: Achieving PCI-DSS Compliance for Containers
sponsored by Aqua Security
WHITE PAPER: Download this guide for future reference to learn how to remain PCI-DSS compliant when implementing containers.
Posted: 18 Jan 2019 | Published: 31 Jul 2017

TOPICS: 
Aqua Security

Security at the Speed of Software Development
sponsored by WhiteSource
WEBCAST: DevSecOps is expected to grow for years to come and many companies have recognized the need to reposition to look more like DevSecOps. However, a lot of that repositioning is just marketing and there is no attempt to really make the transition. In this webcast, Larry Maccherone discusses a 3-part framework for adopting the DevSecOps culture.
Posted: 15 Jan 2019 | Premiered: May 9, 2018

TOPICS: 
WhiteSource

Strategies for Improving Enterprise Application Security
sponsored by WhiteSource
WEBCAST: While most enterprises are focused on application scanning and remediation, many software development experts are advocating better, more secure application development initiatives that prevent vulnerabilities from occurring in the first place. In this webcast, experts discuss steps to integrate security into the app development process.
Posted: 15 Jan 2019 | Premiered: Mar 13, 2018

TOPICS: 
WhiteSource

Meet the Experts: Open Source Security 101
sponsored by WhiteSource
WEBCAST: According to Forrester, 80% of developers used open source in their applications in the past year. When using open source, you must consider the security of the application. This webinar provides a high level overview of considerations that engineering teams and security officers should keep in mind when tackling open source security issues.
Posted: 14 Jan 2019 | Premiered: Jan 26, 2017

TOPICS: 
WhiteSource

Equifax Breach Lessons: How to Avoid Becoming the Next Victim
sponsored by WhiteSource
WEBCAST: Learn about the story behind the largest data breach to date. Understand the root cause, the timeline and why it was preventable. This webcast offers advice on how to avoid being the next Equifax. Some key suggestions include: implementing the right solution, changing the way you think and deal with application security and acting fast.
Posted: 14 Jan 2019 | Premiered: Nov 9, 2017

TOPICS: 
WhiteSource

SANS Product Review Webinar
sponsored by WhiteSource
WEBCAST: Whitesource's open source security solution helps automate the finding of vulnerabilities and open source components and then bridges the gap between development and security professionals. In this webcast, Serge Borso will share his experiences working with Whitesource over the last couple of months.
Posted: 14 Jan 2019 | Premiered: Oct 3, 2018

TOPICS: 
WhiteSource

The State of Open Source Vulnerabilities Management
sponsored by WhiteSource
WEBCAST: Open source software has become an indispensible part of the software industry. However, development and security teams are challenged to meet open source security objectives, without compromising on speed and quality. This webcast discusses the key strategy for effective vulnerability management.
Posted: 09 Jan 2019 | Premiered: Nov 15, 2018

TOPICS: 
WhiteSource

When it Comes to Securing Your Open Source Components, WhiteSource Has You Fully Covered
sponsored by WhiteSource
WHITE PAPER: Open source components are the core building blocks of modern applications. However, development teams have been neglectful when it comes to ensuring that they meet basic security standards. In this white paper, learn about open source security challenges, the two pillars of open source security and why automation is king.
Posted: 08 Jan 2019 | Published: 08 Jan 2019

TOPICS: 
WhiteSource

The Complete Guide on Open Source Security
sponsored by WhiteSource
WHITE PAPER: Open source components are the core building blocks of application software, providing developers with a wealth of off-the-shelf possibilities that they can use for assembling their products. However, the industry has been lax when it comes to meeting basic security standards. In this white paper, learn about securing open source components.
Posted: 08 Jan 2019 | Published: 08 Jan 2019

TOPICS: 
WhiteSource

The Complete Guide to Performance Testing Your Retail Websites and Apps
sponsored by Akamai Technologies
WHITE PAPER: Today retailers are pressured to balance a compelling online shopping experience, as well as a fast and reliable one. While it sounds difficult, it doesn't have to be. In this best practices guide, learn how you can get started with performance testing to help you maintain this balance.
Posted: 27 Dec 2018 | Published: 27 Dec 2018

TOPICS: 
Akamai Technologies

2018 Application Security Statistics Report
sponsored by WhiteHat Security
WHITE PAPER: This application security statistics report provides an analysis of the state of application security, brings to the forefront evolutionary trends, and highlights best practices that result in better application security over time. The report also presents challenges and opportunities to secure the applications.
Posted: 07 Dec 2018 | Published: 31 Dec 2018

TOPICS: 
WhiteHat Security

Automating Hybrid Cloud Security for DevOps
sponsored by Trend Micro
RESOURCE: In this resource, explore the biggest hybrid cloud security challenges, top DevSecOps use cases, the benefits of DevSecOps, and more.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

TOPICS: 
Trend Micro

The State of Application Security in Today's Application Economy
sponsored by Micro Focus
WHITE PAPER: As companies become active players in the application economy, the implications of security—and the lack thereof—loom over them. Organizations that have never before given thought to security are now concerned about the risk posed by their applications. In this IDG quick poll, uncover considerations for building your application security strategy.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

TOPICS: 
Micro Focus
1 - 25 of 79 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement