IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Application Development

RSS Feed   
ALSO CALLED: Security Development Lifecycle, SDL, Developing Secure Applications, Coding Vulnerabilities, Secure Software Development, Secure Programming, Security-related Design
DEFINITION: Ability to maintain security across the application development lifecycle.
Secure Application Development Reports
1 - 25 of 110 Matches Previous Page  |  Next Page
DevSecOps vs. SecDevOps
sponsored by Acunetix
RESOURCE: Traditionally, DevOps processes don’t include security, which is why DevSecOps has risen in popularity recently. However, incorrect application security approaches lead some organizations to embrace SecDevOps instead. So, what are the differences between these two approaches?
Posted: 04 Jun 2020 | Published: 24 Sep 2019


What is Security's Role in Digital Transformation?
sponsored by Rackspace
RESOURCE: When digital transformations first gained popularity, Gartner noticed a general lack of prioritization around security, predicting major service failures by 2020. Luckily, today, some 79% of global executives rank cyberattacks as one of their tip priorities. Read this article to learn more about the role of security in digital transformation.
Posted: 04 Jun 2020 | Published: 25 Feb 2020


Advantages of Reassembly-Free Deep Packet Inspection (RFDPI)
sponsored by SonicWall
DATA SHEET: Download this tech brief to learn about the advantages of Reassembly-Free Deep Packet Inspection (RFDPI).
Posted: 03 Jun 2020 | Published: 03 Jun 2020


What Is DevSecOps and How Should It Work?
sponsored by Acunetix
RESOURCE: Poised to be the successor to DevOps, DevSecOps is a relatively new concept that aims to join the previously separate functions of DevOps and SecOps into a unified environment that provides conditions for secure application development. Read this article to learn more about DevSecOps, its history and how you can get started.
Posted: 03 Jun 2020 | Published: 20 Aug 2019


Dynamic Program Analysis and Static Code Analysis in Web Security
sponsored by Acunetix
RESOURCE: Dive into this article to learn about the advantages and disadvantages of Dynamic Application Security Testing (DAST) and Static Application Security Testing (SAST) and why they often work better together.
Posted: 29 May 2020 | Published: 29 May 2020


How to Build a DevSecOps Culture
sponsored by Lacework
WHITE PAPER: Development and security overlap more and more each year. Fortunately, the rewards of building a DevSecOps culture are enterprise-wide. In this guide, find 5 steps your business can take to build a strong DevSecOps culture.
Posted: 28 May 2020 | Published: 28 May 2020


Securing Containers in a Cloud Environment
sponsored by Lacework
WHITE PAPER: Periodic scans of static infrastructure can no longer fully protect your enterprise. Containers and containerized applications require real-time analysis. Read this white paper to learn how to simultaneously secure containers and your cloud environment.
Posted: 28 May 2020 | Published: 28 May 2020


Trend Micro Cloud One: Cloud Native Application Security
sponsored by Trend Micro
WEBCAST: In this Trend Micro cloud One webinar, join Kyle Klassen, Product Manager of Cloud Native Application Security solutions and Mike Milner Director of Application security as they discuss the Cloud Native Applications framework.
Posted: 27 May 2020 | Premiered: May 27, 2020

Trend Micro

The Role of Kubernetes in Cloud Security
sponsored by Lacework
WHITE PAPER: Adoption of Kubernetes has skyrocketed in the last few years, but knowledge of the platform is still lacking. Download this white paper to learn about the role of Kubernetes in cloud security and how the landscape of security and DevOps is rapidly changing.
Posted: 26 May 2020 | Published: 26 May 2020


Building Security into Your Cloud IT Practices
sponsored by Lacework
WHITE PAPER: Increasing competitive pressures to improve customer experience and speed up the software development lifecycle pushes IT managers and developers to build fast, but not necessarily to build securely. The following guide offers expert advice from 7 distinguished security leaders to help your DevOps teams incorporate security.
Posted: 26 May 2020 | Published: 26 May 2020


Creating a DevSecOps Culture in Your Company
sponsored by Checkpoint Software Technologies
EBOOK: As organizations continue to embrace cloud architectures as their preferred business environment, security methods need to change to reflect the needs of an evolving landscape. In this e-book, you’ll learn more about why organizations are embracing DevSecOps and the Shared Responsibility Model to meet cloud security challenges.
Posted: 21 May 2020 | Published: 21 May 2020

Checkpoint Software Technologies

AppSec Trend Report
sponsored by Trend Micro
RESEARCH CONTENT: Dive into Trend Micro’s AppSec Trend Report to uncover key research findings on the role of application developers in the fight against vulnerabilities, growing AppSec testing techniques, AppSec policies, and more.
Posted: 19 May 2020 | Published: 19 May 2020

Trend Micro

Automate DevOps/SecOps Deployment with CI/CD Pipeline Integrations
sponsored by F5 Networks
WHITE PAPER: Integrating security is often where things get tricky—especially with a ticket-driven process for network and security policies. In this guide, learn how automated DevOps deployments with CI/CD integrations eliminate the risks of traditional software development.
Posted: 18 May 2020 | Published: 18 May 2020

F5 Networks

How to Deliver DevSecOps
sponsored by Veracode, Inc.
EGUIDE: Developer responsibilities are changing to include security—but DevSecOps doesn't have to be a drag. In this exclusive e-Guide, find 3 articles that explore how developers can implement security practices without adding to their workloads or their stress.
Posted: 11 May 2020 | Published: 11 May 2020

Veracode, Inc.

The Top 5 Open Source Vulnerabilities in Technology Companies
sponsored by Sonatype
WHITE PAPER: The tech industry relies on open source technology as a competitive advantage to enable their teams to bring products to market quickly. However, this increased speed also comes with risks. In this white paper, explore the top five areas of vulnerability plaguing organizations in the tech industry today.
Posted: 11 May 2020 | Published: 11 May 2020


Securing the Entire Software Development Pipeline with Veracode Static Analysis
sponsored by Veracode, Inc.
WHITE PAPER: Developers need security testing solutions that can keep the pace with rapid, agile development processes. Traditional AppSec solutions can cause development to stall and delay the release of software. In this guide, learn how static analysis solutions can secure applications without hindering fast development.
Posted: 06 May 2020 | Published: 06 May 2020

Veracode, Inc.

Finding the Restful Path to Certificate Lifecycle Automation and Integration
sponsored by Entrust, Inc.
WHITE PAPER: As an IT leader, it’s important to have those you manage focused on the core functionalities of your business rather than be distracted by security processes. In this white paper, explore the features of Entrust Datacard’s PKI REST API, designed to shift some of the security busy-work away from your team. Read on to learn more.
Posted: 28 Apr 2020 | Published: 28 Apr 2020

Entrust, Inc.

On-Demand Webinar: Building a Secure CI/CD Pipeline
sponsored by Green House Data
WEBCAST: Security can’t be an afterthought. In this webinar, learn how to integrate security into your continuous improvement development process, with code analysis, open source software security scanning, and automated dynamic security. Secure your CI/CD pipeline. Watch the webinar now.
Posted: 28 Apr 2020 | Premiered: Apr 22, 2020

Green House Data

Identify and Mitigate Threats to OpenShift Container-Based Infrastructure with Red Hat Training
sponsored by Red Hat
WEBCAST: How are you keeping your containers secure? In this Red Hat OpenShift webinar, learn about securing both containers and container orchestration platforms, from communication to access control to monitoring practices.
Posted: 27 Apr 2020 | Premiered: Apr 27, 2020

Red Hat

Shifting Cloud Security Left with Infrastructure as Code
sponsored by DivvyCloud
WHITE PAPER: DevOps has forever changed the software development lifecycle for the better. But what is the role of DevOps in ensuring cloud security and compliance? This white paper highlights how addressing key challenges can be addressed by shifting cloud security left – avoiding misconfigurations and misalignments. Read on to learn more.
Posted: 22 Apr 2020 | Published: 22 Apr 2020


NIST Application Security Revisions You Need to Know
sponsored by Contrast Security
RESOURCE: NIST is a standard leader in the cybersecurity space that sets guidelines for organizations to follow across different areas of security. This landing page contains several useful resources focusing on the NIST revisions to their application security guidelines.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

Contrast Security

Securing APIs at DevOps Speed
sponsored by Contrast Security
WEBCAST: When APIs are insecure, we still have something to work with—and the sooner we’re aware of the security threats, the better. In this webinar, learn about the different approaches to API security and how API security can fit into DevOps methodologies for the best results. Watch the webinar here.
Posted: 17 Apr 2020 | Premiered: Apr 17, 2020

Contrast Security

Cloud One™ — Container Security
sponsored by Trend Micro
WHITE PAPER: As cloud-first application development strategies become more of the norm, organizations must focus on container security. The Trend Micro Cloud One Container Security platform, designed for DevOps, protects your organization with rapid detection of malware, compliance violations, and vulnerabilities. Download the data sheet to learn more.
Posted: 16 Apr 2020 | Published: 16 Apr 2020

Trend Micro

Sentinel Auto API
sponsored by WhiteHat Security
DATA SHEET: Traditional API testing is manual, time-consuming, and widely unpopular. In fact, less than 25% of organizations are testing their APIs. However, the critical nature of APIs requires them to be protected. In this data sheet, take a closer look at the key features of Sentinel Auto API and see if it meets for your API security needs.
Posted: 16 Apr 2020 | Published: 16 Apr 2020

WhiteHat Security

The Future is Misconfigured
sponsored by Trend Micro
WHITE PAPER: Traditional security practices aren’t cutting it for containers. Organizations are adopting DevSecOps principles to mediate container security risks and minimize third-party vulnerabilities. Learn more about the demands of container security and how to meet them in this guide.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

Trend Micro
1 - 25 of 110 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info