IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Application Development

RSS Feed   
ALSO CALLED: Security Development Lifecycle, SDL, Developing Secure Applications, Coding Vulnerabilities, Secure Software Development, Secure Programming, Security-related Design
DEFINITION: Ability to maintain security across the application development lifecycle.
Secure Application Development Reports
1 - 25 of 122 Matches Previous Page  |  Next Page
DevSecOps for Cloud-Native Applications with Prisma Cloud
sponsored by Red Hat
WEBCAST: Enterprises modernize legacy applications to take advantage of containers, and Red Hat’s OpenShift Container Platform strives to help them build, deploy and manage their applications. How can they modernize security alongside? Jump into this webinar to learn the additional protection that cloud-native security can provide for OpenShift users.
Posted: 14 Apr 2021 | Premiered: Feb 4, 2021

Red Hat

Securing Red Hat OpenShift Containerized Applications at Enterprise Scale
sponsored by Red Hat
WEBCAST: Over 90% of Fortune 500 companies leverage Red Hat products and solutions – one of which is their OpernShift platform for containerized applications. Professionals looking to add additional security for OpenShift should leverage this webinar detailing how CyberArk’s out-of-the-box integrations can help, demo included.
Posted: 13 Apr 2021 | Premiered: Jun 24, 2020

Red Hat

ESG Top Trends
sponsored by McAfee
WEBCAST: As organizations sprint to develop and deploy cloud-native apps, security often falls by the wayside. This may feel harmless at the time, but it vastly increases risk across the business. Watch this webinar – presented by ESG – to learn the top trends on cloud-native application protection and learn how McAfee can help secure these apps
Posted: 12 Apr 2021 | Premiered: Apr 12, 2021

McAfee

Solving Kubernetes Security Challenges Using Red Hat OpenShift and Sysdig
sponsored by Red Hat
WEBCAST: Kubernetes accelerates application delivery, but it can also complicate security, visibility and compliance. With the right solutions, DevOps teams can reap the benefits of cloud-native infrastructure and keep risk low. Access this webinar to learn how 3 global companies avoided security and compliance issues using Red Hat OpenShift and Sysdig.
Posted: 09 Apr 2021 | Premiered: Dec 17, 2020

Red Hat

Synopsys Product Brief
sponsored by Red Hat
DATA SHEET: Synopsys is a recognized leader in application security, helping organizations to build secure, high-quality software, faster. Amid a hostile application threat environment, they’ve partnered with Red Hat to help customers manage their open source components and associated risk. View this data sheet to learn product benefits and use cases.
Posted: 06 Apr 2021 | Published: 06 Apr 2021

Red Hat

Securing the Cloud Crowdcast
sponsored by CrowdStrike
WEBCAST: Gartner says that by 2025, more than 85% of global organizations will be running containerized applications. Watch this webinar featuring CrowdStrike CTO Michael Sentonas as he discusses securing cloud workloads with DevSecOps practices and methodologies.
Posted: 06 Apr 2021 | Premiered: Apr 6, 2021

CrowdStrike

How to deploy a comprehensive DevSecOps solution
sponsored by Red Hat
WHITE PAPER: As DevOps tools grow and evolve quickly, securing DevOps can feel more and more impossible. In reality, SecDevOps is just getting a bit more complicated—and complex systems are a DevOps engineers’ forte. Learn how to stay confident while deploying your DevSecOps framework with this Red Hat guide.
Posted: 05 Apr 2021 | Published: 05 Apr 2021

Red Hat

Implementing Cloud Native Security: Shift-Left To Increase Effectiveness
sponsored by Palo Alto Networks
WHITE PAPER: Cloud security trends like “shift-left security” and “DevSecOps” refer to new strategies and paradigms that help organizations keep workloads secure in the age of cloud-based, scale-out, constantly changing applications and infrastructure. This guide explores what modern, shift-left security entails.
Posted: 24 Mar 2021 | Published: 13 Nov 2020

Palo Alto Networks

A Layered Approach To Container And Kubernetes Security
sponsored by Red Hat
WHITE PAPER: Comprehensive container and Kubernetes security is all about layers. As with securing Linux processes, you’ll have to think through the layers of the solution stack before deploying and running any container. In this 16-page Red Hat guide, explore the key elements of security for containerized applications. Save the guide here for reference.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

Red Hat

3 Security Best Practices for CI/CD
sponsored by CircleCI
RESOURCE: CI/CD pipelines are at the core of daily operations for many businesses today. The more resources your pipelines have access to (secure secrets, proprietary code, databases, etc.), the more important it is to keep your CI/CD system secure. Read on to uncover the 3 categories of security practices and how to address them.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

CircleCI

Understanding Your Open Source Risk
sponsored by Veracode, Inc.
EBOOK: Developers are being asked to push out more software — and in shorter periods of time — than ever before. This has led to an increased reliance on open source libraries, and as this code is reused, it comes with a high risk of vulnerability. Access this e-book to learn more about the risks of open source and the challenges in securing it.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Veracode, Inc.

4 Ways to Increase Developer Buy-In of AppSec
sponsored by Veracode, Inc.
RESOURCE: Security developers have been doing their best to implement proper security measures, but since their performance is often tied to the rate of deployments, speed tends to take precedence.Access this article to learn about 4 steps you can take as a security professional to ensure that security doesn't take a backseat to speed.
Posted: 16 Mar 2021 | Published: 16 Mar 2021

Veracode, Inc.

Tips to Follow onYour AppSec Journey
sponsored by Veracode, Inc.
RESOURCE: Best practices don’t become best practices overnight. There are first steps to take for each, not least in application security. So for processes such as testing, shifting left and vulnerability management, how can you start? Access this infographic to learn 5 AppSec best practices and 5 practical first steps to each.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

Veracode, Inc.

Leve raging AI to Automate Vulnerability Management
sponsored by Dell SecureWorks
DATA SHEET: Today’s organizations need vulnerability management (VM) solutions that are built to maximize risk reduction. With the power of ML, these same organizations can minimize the manual burden on InfoSec and IT operations teams. Download this data sheet to explore how Secureworks’ VM solution strives to do all this and more.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Dell SecureWorks

Protecting Against the Hidden Threats of New Technologies
sponsored by Traceable
RESOURCE: Software development is being revolutionized by tools like GraphQL, but these new technologies also bring unknown security risks with them. Read this Traceable post to learn some of the biggest challenges facing modern application security, the shortcomings of legacy security, and strategies and solutions tackling this new wave of problems.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable

What AI can do for API Security
sponsored by Traceable
VIDEO: Join security and DevOps experts as they discuss how TraceAI from Traceable uses machine learning for cloud-native application security.
Posted: 17 Feb 2021 | Premiered: 17 Feb 2021

Traceable

API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4
sponsored by Traceable
WEBCAST: Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.
Posted: 17 Feb 2021 | Premiered: May 20, 2020

Traceable

Secure your GraphQL & gRPC APIs
sponsored by Traceable
VIDEO: In this webinar, security experts discuss how optimal application and API architecture requires the use of new protocols. Tune in as they cover the use of Traceable for cloud-native application visibility, protecting external and internal APIs from OWASP Top 10 risks, and more.
Posted: 12 Feb 2021 | Premiered: 12 Feb 2021

Traceable

What Runtime Application Self-Protection (RASP) Doesn’t Solve
sponsored by Traceable
RESOURCE: Tap into this article for RASP’s or Runtime Application Self-Protection’s, strengths and weaknesses in protecting against modern security threats.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Traceable

Traceable Overview CTA Demo
sponsored by Traceable
VIDEO: View this video overview of Traceable and how it uses security observability with artificial intelligence and machine learning to secure modern application architectures and their API's.
Posted: 12 Feb 2021 | Premiered: 12 Feb 2021

Traceable

AppSec Performance Package
sponsored by WhiteHat Security
DATA SHEET: Whether your team is creating its first AppSec program or searching for expert program management to move security left, WhiteHat Security’s AppSec Performance Package might be able to help. Save this data sheet to see how WhiteHat can help your team identify program risks and secure more applications in less time, with less in-house resources.
Posted: 10 Feb 2021 | Published: 10 Feb 2021

WhiteHat Security

AppSec Stats Flash Podcast EP.1 - AppSec Insights + Shared Responsibility = Secure Applications
sponsored by WhiteHat Security
VIDEO: In this episode of the AppSec Stats Flash podcast, join Setu Kulkarni, VP of Corporate Strategy and Business Development and Zach Jones, Sr. Director Security Research, as they dive into the first 3 key metrics of application security and explore the topic of shared responsibility for security. Listen here.
Posted: 10 Feb 2021 | Premiered: 10 Feb 2021

WhiteHat Security

Securing the (API) keys to the Kingdom
sponsored by Tyk
CASE STUDY: To keep API ecosystems secure and ensure active monitoring of API users, APIs need more than a simple gateway to function. Organizations are searching for API management solutions that prioritize authorization and authentication. Learn how companies are finding API security success here.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Tyk

Can You Build Securely In The Cloud?
sponsored by Horangi
RESOURCE: Most engineering teams are no strangers to building in the cloud. However, these cloud environments are huge targets for hackers, and user errors/misconfigurations are making this critical data a low hanging fruit. Read this article to discover how remote engineering teams can address these concerns and build more securely in the cloud.
Posted: 04 Feb 2021 | Published: 04 Feb 2021

Horangi

11 Recommended Security Practices to Manage the Container Lifecycle
sponsored by VMware Tanzu
WHITE PAPER: Development, security, and operations leaders all share a common concern: application security across the software development lifecycle. The problem is, no team wants to fully claim this challenge as their own. Download this guide to learn about 11 security practices that everyone can get behind.
Posted: 04 Feb 2021 | Published: 04 Feb 2021

VMware Tanzu
1 - 25 of 122 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences