Secure Application Development

Secure Application Development Reports
A Computer Weekly e-guide to SASE
sponsored by ComputerWeekly.com
EGUIDE: Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
Posted: 12 Nov 2021 | Published: 12 Nov 2021

ComputerWeekly.com

A Computer Weekly e-guide to SASE
sponsored by ComputerWeekly.com
EGUIDE: Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
Posted: 29 Jul 2021 | Published: 28 Jul 2021

ComputerWeekly.com

APPSEC PERFORMANCE PACKAGE
sponsored by WhiteHat Security
DATA SHEET: Whether your team is creating its first AppSec program or searching for expert program management to move security left, WhiteHat Security’s AppSec Performance Package might be able to help. Save this data sheet to see how WhiteHat can help your team identify program risks and secure more applications in less time, with less in-house resources.
Posted: 10 Feb 2021 | Published: 10 Feb 2021

WhiteHat Security

AppSec Stats Flash Podcast
sponsored by WhiteHat Security
VIDEO: In this episode of the AppSec Stats Flash podcast, join Setu Kulkarni, VP of Corporate Strategy and Business Development and Zach Jones, Sr. Director Security Research, as they dive into the first 3 key metrics of application security and explore the topic of shared responsibility for security. Listen here.
Posted: 10 Feb 2021 | Premiered: 10 Feb 2021

WhiteHat Security

Application Evolution
sponsored by WhiteHat Security
VIDEO: In this video, learn how the nature of IT security is changing and what that means for the roles and expertise required inside your organization, so you can successfully secure your applications – and your future.
Posted: 14 Dec 2020 | Premiered: 14 Dec 2020

WhiteHat Security

Whitehat Security Webinar
sponsored by WhiteHat Security
WEBCAST: Dynamic Application Security Testing (DAST) enables AppSec teams with the ability to assess and address the actual risk of their applications – providing critical security capabilities to support DevSecOps initiatives. Watch this webinar to learn more about DAST and how it can support your AppSec goals.
Posted: 10 Dec 2020 | Premiered: Dec 10, 2020

WhiteHat Security

The State of Application Security
sponsored by WhiteHat Security
WEBCAST: Attackers continue to take advantage of application flaws to compromise organizations and put their customers at risk. This means that as much as Dev teams prioritize faster release cycles, it’s important that they don’t overlook security. In this WhiteHat webinar, examine the state of application security and what you can do to stay protected.
Posted: 09 Dec 2020 | Premiered: Dec 9, 2020

WhiteHat Security

Enable and Educate Your Team
sponsored by WhiteHat Security
DATA SHEET: Too many cyberattacks come from subpar employee enablement and/or security misconfigurations. WhiteHat is looking to resolve this issue with their eLearning Platform, designed to educate your users on common application security threats, best practices, incident remediation, and more – read on to learn more about the platform.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

WhiteHat Security

Mobile Security App-titude
sponsored by WhiteHat Security
WEBCAST: View Mobile Security App-titude: Best Practices for Secure App Design and Data Privacy to learn about PII – what data is being collected, how sensitive information can be compromised, how you can protect user data, and more.
Posted: 24 Nov 2020 | Premiered: Nov 24, 2020

WhiteHat Security

Reduce API Security
sponsored by WhiteHat Security
WEBCAST: Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent history. How do we reduce API security risks? View this webcast to learn why testing may be the key.
Posted: 20 Nov 2020 | Premiered: Jul 15, 2020

WhiteHat Security

DevSecOps Framework
sponsored by WhiteHat Security
WEBCAST: Organizational infrastructure is becoming more and more vulnerable, and as a result, development teams are searching for ways to securely develop, build and deploy business-driving applications. So, what can these teams do to get started? They can begin by watching this webcast to learn the keys to a successful DevSecOps implementation.
Posted: 16 Nov 2020 | Premiered: Nov 16, 2020

WhiteHat Security

Web and Mobile Application Security Testing Solution Brief
sponsored by WhiteHat Security
PRODUCT OVERVIEW: According to the NTT 2020 Global Threat Intelligence Report, 55% of all attacks last year were application specific. Named a leader in a recent Gartner Magic Quadrant report, WhiteHat offers an application security testing bundle – designed to automate testing across the entire DevOps lifecycle. Download this solution brief to learn more.
Posted: 30 Jun 2020 | Published: 30 Jun 2020

WhiteHat Security

Container Security 101: Understanding the Basics of Securing Containers
sponsored by Palo Alto Networks
WHITE PAPER: Container environments bring a range of cybersecurity issues involving images, containers, hosts, runtimes, registries, and orchestration platforms, which all need to be secured. Not sure where to begin? Download Container Security 101: Understanding the Basics of Securing Containers for everything you need to know.
Posted: 08 Jun 2020 | Published: 08 Jun 2020

Palo Alto Networks

SENTINEL AUTO API
sponsored by WhiteHat Security
DATA SHEET: Traditional API testing is manual, time-consuming, and widely unpopular. In fact, less than 25% of organizations are testing their APIs. However, the critical nature of APIs requires them to be protected. In this data sheet, take a closer look at the key features of Sentinel Auto API and see if it meets for your API security needs.
Posted: 16 Apr 2020 | Published: 16 Apr 2020

WhiteHat Security

PERIMETER SECURITY NOISE LEAVES APPLICATIONS VULNERABLE TO ATTACKS
sponsored by Contrast Security
WHITE PAPER: Learn how you can get AppSec protection that can compensate with the necessary visibility, accuracy, scalability, and ease of deployment to keep pace with modern application vulnerabilities without generating false positives and false negatives.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

Contrast Security

The AI and Human Element Security Sentiment Study
sponsored by WhiteHat Security
RESEARCH CONTENT: 60% of organizations have more faith in human-verified cyberthreat findings over AI-verified ones. In this security report, researchers examine the RSA Conference 2020 survey results to uncover growing trends in the industry. Gain insight into industry trends. Download the report here.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

WhiteHat Security

CW APAC - November 2019: Expert advice on container security
sponsored by ComputerWeekly.com
EZINE: For all the promises of containers, changes in architectureand practices associated with the technology bring newchallenges and opportunities. In this handbook, Computer Weekly looks at the security challenges associated with container technology. Read the issue now.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

ComputerWeekly.com

VMs vs. containers: Which is better for security?
sponsored by ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 02 Oct 2019 | Published: 02 Oct 2019

ComputerWeekly.com

Computer Weekly buyer's guide to mobile app development
sponsored by ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

ComputerWeekly.com

A Guide to Joining DevOps and Security
sponsored by Trend Micro, Inc.
EGUIDE: If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
Posted: 09 May 2019 | Published: 03 May 2019

Trend Micro, Inc.

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

DevSecOps: Putting the Security in DevOps
sponsored by Sonatype
EGUIDE: Security in DevOps, aptly named DevSecOps, is something that your development organization is going to have to deal with soon. This e-guide is your primer to bringing these two departments together when they come from such different perspectives. Learn how to improve collaboration, incorporate security earlier in development, and more.
Posted: 08 May 2017 | Published: 04 May 2017

Sonatype

Buyer's Essentials: What to Look for in an EMM Strategy
sponsored by SearchSecurity.com
EBOOK: EMM products can contain a variety of features - for mobile device management, mobile app management, mobile content management and more. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

SearchSecurity.com

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Untangling Work and Personal Data with Enterprise MAM
sponsored by IBM
EBOOK: This exclusive 3-part e-book explains how and why you should use mobile app management (MAM) to control enterprise apps. Inside, discover how you can securely enable successful enterprise mobility, and get an inside look at a MAM comparison: app wrapping vs. containerization.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

IBM