IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Application Development

RSS Feed   
ALSO CALLED: Security Development Lifecycle, SDL, Developing Secure Applications, Coding Vulnerabilities, Secure Software Development, Secure Programming, Security-related Design
DEFINITION: Ability to maintain security across the application development lifecycle.
Secure Application Development Reports
1 - 25 of 82 Matches Previous Page  |  Next Page
RingCentral Case Study
sponsored by Data Theorem
CASE STUDY: RingCentral did not have the experts or a scalable platform to provide security coverage for their mobile apps. However, they have a requirement with their customers and partners to perform third-party security testing for all of their apps. In this case study, learn how RingCentral was able to address this issue using Data Theorem's App Secure.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Data Theorem

Automate Compliance Audits Without the Staff
sponsored by Data Theorem
WEBCAST: Data security and privacy are top of mind issues for security leaders and corporate boards. However, Agile and DevOps development models are moving too quickly for manual security assurance and compliance validation. In this webcast, learn how to automate the compliance and audit process.
Posted: 09 Apr 2019 | Premiered: Feb 1, 2019

Data Theorem

The ROI of Security Orchestration and Automation
sponsored by Rapid7
WHITE PAPER: Security operations are often slowed down by manual processes that would be better left to machines. As a result, security orchestration and automation is becoming an increasingly vital aspect of many organizations' security strategies. In this white paper, explore the benefits and value of security orchestration and automation.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Rapid7

6 Steps to Comprehensive Container Security
sponsored by Trend Micro, Inc.
WHITE PAPER: Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.
Posted: 04 Apr 2019 | Published: 31 Mar 2019

Trend Micro, Inc.

Run Applications Anywhere
sponsored by Trend Micro, Inc.
WEBCAST: In this webcast, listen as Mark Nunnikhoven, VP of Cloud Research at Trend Micro discusses how you can implement a simpler strategy for maintaining security while running your applications in any environment.
Posted: 04 Apr 2019 | Premiered: Apr 4, 2019

Trend Micro, Inc.

Building Secure Software
sponsored by Trend Micro, Inc.
WEBCAST: Building securely doesn't just mean the code you are creating is high quality and doesn't have any obvious security vulnerabilities; it's more complicated than that. You have to account for that complexity when checking for vulnerabilities. In this webcast, listen as Mark Nunnikhoven of Trend Micro discusses how to build securely.
Posted: 03 Apr 2019 | Premiered: Apr 3, 2019

Trend Micro, Inc.

Leveraging the Agility of DevOps Processes to Secure Hybrid Clouds
sponsored by Trend Micro, Inc.
WHITE PAPER: In this white paper, explore how hybrid clouds bring changes to business models, methodologies, and technologies, the intersection of which represents an opportunity to efficiently improve an organization's cybersecurity while also enabling the speed of business.
Posted: 02 Apr 2019 | Published: 30 Apr 2018

Trend Micro, Inc.

Market Guide for Cloud Workload Protection Platforms: Assessment
sponsored by Trend Micro, Inc.
RESOURCE: With the rise of cloud adoption, there is a fast-moving shift from traditional signature-based end-user security to a much more tactful and strategic approach to protecting cloud servers and workloads. In this resource, explore 5 buyer recommendations to address security and compliance risks inherent in public cloud environments.
Posted: 02 Apr 2019 | Published: 02 Apr 2019

Trend Micro, Inc.

The Beginners' Guide to Hacker-Powered Security
sponsored by HackerOne
WHITE PAPER: Leveraging the wisdom and power of the vast white-hat hacker community is a new security expectation. In this white paper, learn the best practices for starting and running effective disclosure and bug bounty programs, and how to integrate hacker-powered security into your organization.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

HackerOne

A Patch Made in Heaven
sponsored by Kaseya
WHITE PAPER: As breaches become more prevalent, IT professionals must accept patch management for what it is — a way to create a robust security layer with the routine and timely installation of patches. Time being the most critical element. In this white paper, learn about 3 critical components to any effective patch management strategy.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

Kaseya

Application Security and How to Improve it
sponsored by WhiteHat Security
WHITE PAPER: UBM conducted an online survey to explore common trends and challenges in app security, and to understand how security and development teams can work together to close these gaps. Click here for an inside look at the survey results.
Posted: 06 Mar 2019 | Published: 31 Dec 2018

WhiteHat Security

Circumventing a Blacklist to Exploit Cross-Site Scripting
sponsored by WhiteHat Security
PRODUCT OVERVIEW: Discover how a cross-site scripting (XSS) vulnerability was found during an assessment of a financial services website and how the tester managed to get around the malicious script.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

WhiteHat Security

Reinvent Endpoint Security with Management Print Services
sponsored by HP
PRODUCT OVERVIEW: Download this white paper to learn about HP Secure Managed Print Services (MPS), and how they simplify print security by assessing risks, securing and managing your fleet, maintaining printer security compliance, and keeping everything up-to-date with the latest protections.
Posted: 04 Mar 2019 | Published: 04 Mar 2019

HP

Static Analysis and the Truth About False Positives
sponsored by WhiteHat Security
PRODUCT OVERVIEW: Learn the truth behind false positives and how a source code scanning technology that is not programmed with assumptions can help your application security program today.
Posted: 04 Mar 2019 | Published: 04 Mar 2019

WhiteHat Security

Why Websites Stay Vulnerable: And What You Can Do About It
sponsored by WhiteHat Security
WEBCAST: There have been a number of data breaches in the news recently due to website vulnerabilities. In order to ensure your business isn't breached, incorporate security into your development process. In this webcast, explore key considerations for securing your web applications.
Posted: 01 Mar 2019 | Premiered: Mar 1, 2019

WhiteHat Security

Top 7 Reasons Why Organizations Choose WhiteHat Security
sponsored by WhiteHat Security
RESOURCE: In this infographic, find out the top 7 reasons organizations choose to work with WhiteHat Security.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

WhiteHat Security

2018 Security Implications of Digital Transformation Report
sponsored by Fortinet, Inc.
RESEARCH CONTENT: While the potential of digital transformation is exciting from a business perspective, changes stemming from it can create anxiety for the cybersecurity team. In Fortinet's 2018 Security Implications of Digital Transformation Survey, examine the state of cybersecurity in organizations around the world from the lens of digital transformation.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

Fortinet, Inc.

Velocity with Security A Guide to Amazon Web Services (AWS) Cloud Security Best Practices
sponsored by Symantec
WHITE PAPER: As cloud adoption increases within organizations and new agile development processes become widespread, new threats and vulnerabilities have emerged. It's important to create a culture of security across your organization. In this white paper, learn about best practices to help secure your cloud environment and software development lifecycle.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Symantec

Automating Security for DevOps: Best Practices for Securing the Continuous Integration and Continuous Delivery (CI/CD) Pipeline
sponsored by Symantec
WHITE PAPER: While organizations are interested in integrating security with DevOps processes, they find it difficult to find specifics on how to get started. In this best practices guide, learn how to leverage automation to assure the right cybersecurity measures are applied at each step of the CI/CD pipeline.
Posted: 26 Feb 2019 | Published: 26 Feb 2019

Symantec

DevSecOps at Hulu: When DevOps and Security Meet
sponsored by Signal Sciences
VIDEO: Today modern technical companies like Hulu have been adopting a culture where DevOps and security operate as one. In this webinar, hear from Emilio Escobar, Director of Information Security at Hulu, as he discusses how Hulu successfully brought security into the DevOps ecosystem, the benefits of a DevOps culture, and more.
Posted: 25 Feb 2019 | Premiered: 25 Feb 2019

Signal Sciences

2018 Global Study on Application Security
sponsored by Arxan
RESEARCH CONTENT: Ponemon Institute conducted a survey to understand the risk that unprotected applications pose to businesses when running in unsecured environments and how organizations are addressing this risk in practice. In this research report, learn about key findings from the survey.
Posted: 14 Feb 2019 | Published: 31 May 2018

Arxan

Market Guide for Application Shielding
sponsored by Arxan
RESEARCH CONTENT: Protecting applications that run within untrusted environments is crucial as mobile, IoT and modern web applications migrate software logic to the client side. Application shielding is well-suited to protect consumer mobile apps. Download this Gartner research report to learn more about application shielding.
Posted: 14 Feb 2019 | Published: 27 Jun 2018

Arxan

Securing Web Apps From the Inside Out
sponsored by Arxan
WHITE PAPER: To protect against threats to JavaScript apps, organizations need more than just WAFs, they need a way to secure apps from the inside out, starting with code. Download this white paper to learn about a multilayered approach that can help protect your apps before it's too late.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Arxan

Secure App Development: Success Story
sponsored by Micro Focus
WEBCAST: Tune into this webcast to learn about a security tool that was designed for developers and allows developers to jump into the tool at any point to create a secure software development lifecycle program.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019

Micro Focus

Change Healthcare
sponsored by Micro Focus
CASE STUDY: Applications developed by Change Healthcare are used to process millions of healthcare transactions. Therefore, it is essential for the organization to ensure all data is secure. In this case study, learn how Fortify on Demand and Micro Focus Fortify WebInspect provided an affordable and effective means of finding and fixing vulnerabilities.
Posted: 30 Jan 2019 | Published: 31 Aug 2018

Micro Focus
1 - 25 of 82 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement