IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Application Development

RSS Feed   
ALSO CALLED: Security Development Lifecycle, SDL, Developing Secure Applications, Coding Vulnerabilities, Secure Software Development, Secure Programming, Security-related Design
DEFINITION: Ability to maintain security across the application development lifecycle.
Secure Application Development Reports
1 - 25 of 88 Matches Previous Page  |  Next Page
The State of Web Application Security
sponsored by Radware
RESEARCH CONTENT: Download The State of Web Application Security for a summary of current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.
Posted: 28 Feb 2020 | Published: 28 Feb 2020

Radware

The Secure DevOps Imperative: 3 Best Practices for Securing Cloud Applications
sponsored by Trend Micro
WHITE PAPER: Agile and DevOps represent a massive shift in an organization’s cultural mindset. However, only recently has security been made a priority within this landscape. Given the amount of sensitive data residing in cloud applications, incorporating security is critical. Download this white paper to unlock 3 best practices for securing DevOps adoption.
Posted: 26 Feb 2020 | Published: 30 Nov 2019

Trend Micro

The Four Biggest Challenges to Keeping Modern Applications Secure
sponsored by Radware
WHITE PAPER: According to a recent study, just 33% of organizations feel their web application firewall (WAF) addresses all application-targeted threats. While implementing a WAF is an important starting point for ensuring the protection of modern apps, there are other key challenges and threats to consider. Download this report to learn more.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

Radware

Is Having Too Many Apps Expanding your Threat Surface?
sponsored by F5 Networks
WHITE PAPER: According to a recent IDG study, the average company has 1,742 business apps in their environment – making some wonder: Is this too many? How many is too many? What are the risks, if any, of too many applications? Download this white paper to uncover answers to these questions & more.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

F5 Networks

The Rise of the Open Source Program Office
sponsored by Fossa
WHITE PAPER: Open source software is fundamentally different from proprietary software. Often, different teams use and/or build open source differently. Because of this variability, it needs to be approached differently. Managing this strategy is the job of the OSPO (Open Source Program Office). But what is an OSPO and how do you build one? Read on to find out.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Fossa

CISO’s Guide to DevOps: Learning to Cooperate with DevOps
sponsored by ShieldX
WHITE PAPER: Today’s CISOs are under pressure to establish data security protocols while enabling an agile development environment. The following guide is a checklist designed to help CISOs with the issue of incorporating security into DevOps. Read on for tips and tricks on improving how you work with DevOps.
Posted: 27 Jan 2020 | Published: 31 Oct 2018

ShieldX

A CISO’s Guide to Fixing Flat Networks and Vulnerable Systems
sponsored by ShieldX
WHITE PAPER: Traditional perimeter security is obsolete when it comes to preventing lateral hacker movement in the cloud era. Even Gartner recommends an updated approach focused on security access at the workload level. This guide highlights the faults of traditional security tactics includes a checklist of the benefits of a micro-segmentation approach.
Posted: 24 Jan 2020 | Published: 30 Nov 2018

ShieldX

Javascript vs Javascript: Performance Penalty of Api Hooking
sponsored by Tala Security
WHITE PAPER: While it’s intuitive that defending your code is an important practice, there are times when that defense comes at a high cost.In this white paper, get an overview of the performance penalties associated with hooking browser JavaScript APIs to defend against JavaScript based threats.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Tala Security

2018 Global Study on Application Security
sponsored by Arxan
RESEARCH CONTENT: Ponemon Institute conducted a survey to understand the risk that unprotected applications pose to businesses when running in unsecured environments and how organizations are addressing this risk in practice. In this research report, learn about key findings from the survey.
Posted: 31 Dec 2019 | Published: 31 May 2018

Arxan

Cloud Security – Fix Governance not just technology
sponsored by Capgemini
RESOURCE: When it comes to developing security management programs, most enterprises focus on technology service and functionality rather than thinking strategically. A security approach that prioritizes governance allows for organizations to centralize strategic efforts and ensure cloud adoption preparedness. Read on to learn more.
Posted: 23 Dec 2019 | Published: 16 Jun 2019

Capgemini

Accelerate Innovation with Automated Security
sponsored by Sonatype
WHITE PAPER: The convenience of open source software for developers is unmatched. However, it’s critical to consider the vulnerabilities of open source software when developing security policies. In this white paper, go in-depth into the Nexus Platform for protecting your organization’s software development lifecycle.
Posted: 20 Dec 2019 | Published: 20 Dec 2019

Sonatype

Cloud can mean better security, not less security
sponsored by Capgemini
RESOURCE: While security concerns are legitimate, businesses cannot afford to let security challenges hold them back from embracing cloud technology. Especially since cloud also offers security advantages. In this article, uncover 3 categories of cloud security concerns and explore the tactics and technologies that can enhance cybersecurity efforts.
Posted: 18 Dec 2019 | Published: 27 Sep 2018

Capgemini

Application Shielding with Intertrust whiteCriterion Code Protection
sponsored by Intertrust
WHITE PAPER: Traditional parameter security measures lack the flexibility needed to meet mobile and IoT security risks. This white paper goes in-depth into the specific security challenges hackers are using to expose application vulnerabilities and defines the tactics and tools that can be implemented to mitigate these risks.
Posted: 17 Dec 2019 | Published: 31 Aug 2018

Intertrust

Key Protection with Intertrust whiteCriterion Secure Key Box
sponsored by Intertrust
WHITE PAPER: Traditional perimeter security strategies are insufficient for protecting the growing number of remote devices being used to conduct business. This white paper overviews cryptographic key security, a threat that is becoming increasingly relevant in today’s digital environment, and highlights the common techniques used by hackers.
Posted: 16 Dec 2019 | Published: 31 Aug 2018

Intertrust

Gentek Global Secures Payment Systems with Application Shielding
sponsored by Intertrust
CASE STUDY: In this case study, discover how Gentek, a payment systems security company, partnered with Intertrust to deploy robust application shielding for its payment systems in order to protect user data and adhere to regulatory requirements of the payments industry.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

Intertrust

Taking Steps to Protect Financial Mobile Applications
sponsored by Intertrust
WHITE PAPER: Although the popularity of mobile applications has greatly simplified the use of day-to-day financial operations for the end user, it has created additional workload for ensuring their security. In this white paper, take an in-depth look into the world of financial mobile applications and learn practical ways to ensure protection.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

Intertrust

How to Lock Down Git
sponsored by Perforce
WHITE PAPER: While Git allows for developers to collaborate, it can also contribute to loss of intellectual property & significant security issues. This white paper covers tactics designed to mitigate the risks of Git & discusses best practices for securing native Git. Download this report to get started.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

Perforce

Security for Cloud and On-Premises Deployment
sponsored by Mendix
WHITE PAPER: In this whitepaper, take an in-depth look at the Mendix platform, specifically as it relates to security for cloud, private cloud & on-premises environments. Download this report & discover why businesses across multiple industries trust Mendix to oversee the protection of their mission-critical data.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

Mendix

CW APAC - November 2019: Expert advice on container security
sponsored by ComputerWeekly.com
EZINE: For all the promises of containers, changes in architectureand practices associated with the technology bring newchallenges and opportunities. In this handbook, Computer Weekly looks at the security challenges associated with container technology. Read the issue now.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

ComputerWeekly.com

Who’s Stalking Mobile App Users?
sponsored by The Media Trust
WHITE PAPER: It’s difficult to disagree with the convenience of mobile applications, but have you ever considered the data being captured? Consumer awareness and regulations like GDPR & CCPA are creating a dramatic shift in app development and experience. In this report, find hidden vulnerabilities, the role of cookies & other findings.
Posted: 01 Nov 2019 | Published: 31 Oct 2019

The Media Trust

Securing Cloud-Native Kubernetes Applications
sponsored by Radware
WHITE PAPER: When businesses look to optimize and accelerate application development life cycles and deliver their applications in public clouds, security becomes a greater challenge. In this white paper, learn how to ensure the timely development and deployment of secure applications across hybrid computing environments.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

Radware

Introduction to DevSecOps
sponsored by Contrast Security
WHITE PAPER: Gartner has named DevSecOps one of their fastest-growing areas of interest and predicts that DevSecOps will be embedded into 80% of rapid development teams by 2021. In this white paper, explore 4 core practices to any DevSecOps initiative.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Contrast Security

VMs vs. containers: Which is better for security?
sponsored by ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 02 Oct 2019 | Published: 02 Oct 2019

ComputerWeekly.com

A DevSecOps Guide
sponsored by Aqua Security
WHITE PAPER: After understanding the value of a DevOps mindset, making the cultural shift and reaping the benefits, many companies are aiming for the next big step: integrating development, operations, and security into one organization. In this white paper, learn how to successfully implement DevSecOps in your organization.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Aqua Security

Using the AWS Well-Architected Framework to Support DevSecOps
sponsored by nClouds
RESOURCE: In this blog, discover strategies for applying guidelines from the AWS Well-Architected Framework in a low-friction way to make it easier to prioritize security and advance your DevSecOps approach.
Posted: 25 Sep 2019 | Published: 19 Nov 2018

nClouds
1 - 25 of 88 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info