IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Application Development

RSS Feed   
ALSO CALLED: Security Development Lifecycle, SDL, Developing Secure Applications, Coding Vulnerabilities, Secure Software Development, Secure Programming, Security-related Design
DEFINITION: Ability to maintain security across the application development lifecycle.
Secure Application Development Reports
1 - 25 of 76 Matches Previous Page  |  Next Page
Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
Posted: 01 Aug 2018 | Published: 02 Feb 2018

Veracode, Inc.

Protecting Microservices and APIs with ABAC, OAuth and OpenID Connect
sponsored by Axiomatics
WHITE PAPER: This resource outlines a set of examples where security standards work together in addressing requirements that are difficult or impossible to meet by using OAuth or OIDC alone. Find out how your organization can combine security capabilities to separate privacy concerns and more.
Posted: 17 Jun 2018 | Published: 15 Jun 2018

Axiomatics

In Defense of Secure, Compliant Information Sharing
sponsored by Axway
RESOURCE: Find out how the Danish Defence selected the API platform that would best fit their needs, and explore the ins and outs of deploying in a secure DMZ.
Posted: 21 May 2018 | Published: 29 Dec 2017

Axway

A Tale of Two Teams
sponsored by Veracode, Inc.
WHITE PAPER: As DevSecOps changes the way software is created and distributed, it is also changing the roles and responsibilities of the development and security teams. Explore these new processes and priorities for each team throughout the software lifecycle.
Posted: 03 May 2018 | Published: 03 May 2018

Veracode, Inc.

LogRhythm '2018 Cybersecurity Perceptions and Practices Benchmark Survey'
sponsored by LogRhythm, Inc.
ANALYST REPORT: Find out why security teams need to be working more intentionally to take time to understand the full scope of an incident and determine how to best neutralize it.
Posted: 27 Apr 2018 | Published: 27 Apr 2018

LogRhythm, Inc.

Computer Weekly buyer's guide to mobile app development
sponsored by ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

ComputerWeekly.com

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

The DevSecOps Global Skills Survey
sponsored by Veracode, Inc.
RESEARCH CONTENT: This DevSecOps Global Skills Survey looks at the responses from 400 DevOps professionals on the state of DevOps workforces and education. Gain insight into how developers, IT ops, QA professionals, and even security view current DevOps and DevSecOps practices.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Veracode, Inc.

Getting Started with Secure DevOps
sponsored by Veracode, Inc.
WEBCAST: Find out how to extend the collaborative efforts between developers and IT operations to your security pros as well so that you can shift towards a DevSecOps culture and incorporate app security as early and often into the development lifecycle as you can.
Posted: 17 Jan 2018 | Premiered: May 25, 2017

Veracode, Inc.

The State of Software Security: Developer Guide
sponsored by Veracode, Inc.
WHITE PAPER: This State of Software Security report examines the increased burden on developers to ensure sound app security testing, particularly in DevOps and Agile environments. Discover best practices to improve app security testing and remediation, and learn about the tenets of DevSecOps.
Posted: 12 Jan 2018 | Published: 31 Dec 2017

Veracode, Inc.

Best Practices: Strategies For Making The Crucial Shift To DevSecOps
sponsored by Veracode, Inc.
RESEARCH CONTENT: This Forrester Research report examines the importance of incorporating security into DevOps methodologies. Discover 3 steps for shifting from DevOps to DevSecOps and find out how to deliver high-quality apps faster.
Posted: 11 Jan 2018 | Published: 01 May 2017

Veracode, Inc.

11 Security Analytics Providers Slug it Out
sponsored by LogRhythm, Inc.
WHITE PAPER: Forrester surveys indicate that 74% of global enterprise security technology decision makers rate improving security monitoring as a high or critical priority. In this Forrester report, discover an in-depth look at 11 security analytics vendors: where they excel, fall short, and how they compare to one another.
Posted: 14 Sep 2017 | Published: 06 Mar 2017

LogRhythm, Inc.

Security's New Frontier: The Cloud
sponsored by Cisco Umbrella
EBOOK: By 2018, SaaS usage is expected to increase 70% and security can't wait any longer. Inside this e-book, uncover how to securely adopt and use the cloud to better manage security policies and gain visibility beyond the perimeter.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Cisco Umbrella

How To Securely Configure A Linux Host To Run Containers
sponsored by Twistlock, Inc.
WHITE PAPER: Discover how to update traditional security for containerized, microservices-based app development by learning how to securely configure a Linux host to run Docker containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


The Proactive Security Paradigm: How Containers Can Revamp Your Approach To Security
sponsored by Twistlock, Inc.
WHITE PAPER: Learn how to integrate security into DevOps with a container-first security platform that creates more secure microservices-based app development environments and uncover 6 often overlooked security benefits of containers.
Posted: 21 Jul 2017 | Published: 21 Jul 2017


DevSecOps: Putting the Security in DevOps
sponsored by Sonatype
EGUIDE: Security in DevOps, aptly named DevSecOps, is something that your development organization is going to have to deal with soon. This e-guide is your primer to bringing these two departments together when they come from such different perspectives. Learn how to improve collaboration, incorporate security earlier in development, and more.
Posted: 08 May 2017 | Published: 04 May 2017

Sonatype

Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

IBM

Application Security: Evaluate Leading Testing Vendors
sponsored by IBM
WHITE PAPER: This Gartner resource compares 19 leading application security testing solution vendors, revealing the strengths and weaknesses of each one. View now and discover how the vendors performed in areas like product quality, sales execution and pricing, and customer experience.
Posted: 11 Mar 2016 | Published: 06 Aug 2015

IBM

Transforming Cloud Datacenter Security for Business Mobility
sponsored by vmware airwatch
WHITE PAPER: In this white paper, you'll learn ways to secure proprietary applications and data in the cloud data center. Learn what these cloud security approaches can offer over traditional security methods.
Posted: 18 Sep 2015 | Published: 18 Sep 2015

vmware airwatch

Support and Secure Mobile Devices with Enterprise Cloud Management
sponsored by vmware airwatch
WHITE PAPER: This white paper is designed to help organizations securely leverage Office 365 on their mobile devices. Discover how to secure all company apps both cloud and on-premise.
Posted: 18 Sep 2015 | Published: 31 Jan 2014

vmware airwatch

Empower More Productive Users with EMM and Enterprise Mobility
sponsored by vmware airwatch
RESOURCE: This infographic will review how current mobility trends (like the expansion of cloud architecture) are affecting EMM. Discover how cloud-enabled EMM can power the productivity of your users and IT, as well as 5 reasons to employ advanced EMM.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

vmware airwatch

Become a Technology Partner with Citrix and Expand Your Business Reach
sponsored by Citrix Ready
WEBCAST: This webinar describes how Citrix Ready showcases verified products that are trusted to enhance Citrix solutions for mobility, virtualization, networking, and cloud platforms. Plus you learn why becoming a technology partner with Citrix will expand your business reach and bottom line.
Posted: 09 Sep 2015 | Premiered: Nov 3, 2015

Citrix Ready

Top 5 Cloud Data Protection Challenges. Solved.
sponsored by Commvault
WHITE PAPER: This white paper serves as guide with which you can realize the full potential of your next cloud project. Read on to see how the following 5 challenges may impact your cloud integration strategy.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Buyer's Essentials: What to Look for in an EMM Strategy
sponsored by SearchSecurity.com
EBOOK: EMM products can contain a variety of features - for mobile device management, mobile app management, mobile content management and more. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

SearchSecurity.com
1 - 25 of 76 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement