IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Application Development

RSS Feed   
ALSO CALLED: Security Development Lifecycle, SDL, Developing Secure Applications, Coding Vulnerabilities, Secure Software Development, Secure Programming, Security-related Design
DEFINITION: Ability to maintain security across the application development lifecycle.
Secure Application Development Reports
1 - 25 of 89 Matches Previous Page  |  Next Page
A Computer Weekly e-guide to SASE
sponsored by ComputerWeekly.com
EGUIDE: Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
Posted: 29 Jul 2021 | Published: 28 Jul 2021

ComputerWeekly.com

Netherlands Security Insights Report
sponsored by DWA UK - VMware (Carbon Black)
RESEARCH CONTENT: This report examines Netherlands organizations' plans for securing new technology, adopting a cloud-first security strategy, and dealing with the complexity of the current cybersecurity management environment.
Posted: 14 Jun 2021 | Published: 14 Jun 2021

DWA UK - VMware (Carbon Black)

Securing the Cloud Crowdcast
sponsored by CrowdStrike
WEBCAST: Gartner says that by 2025, more than 85% of global organizations will be running containerized applications. Watch this webinar featuring CrowdStrike CTO Michael Sentonas as he discusses securing cloud workloads with DevSecOps practices and methodologies.
Posted: 06 Apr 2021 | Premiered: Apr 6, 2021

CrowdStrike

Implementing Cloud Native Security: Shift-Left To Increase Effectiveness
sponsored by Palo Alto Networks
WHITE PAPER: Cloud security trends like “shift-left security” and “DevSecOps” refer to new strategies and paradigms that help organizations keep workloads secure in the age of cloud-based, scale-out, constantly changing applications and infrastructure. This guide explores what modern, shift-left security entails.
Posted: 24 Mar 2021 | Published: 13 Nov 2020

Palo Alto Networks

Understanding Your Open Source Risk
sponsored by Veracode, Inc.
EBOOK: Developers are being asked to push out more software — and in shorter periods of time — than ever before. This has led to an increased reliance on open source libraries, and as this code is reused, it comes with a high risk of vulnerability. Access this e-book to learn more about the risks of open source and the challenges in securing it.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Veracode, Inc.

4 Ways to Increase Developer Buy-In of AppSec
sponsored by Veracode, Inc.
RESOURCE: Security developers have been doing their best to implement proper security measures, but since their performance is often tied to the rate of deployments, speed tends to take precedence.Access this article to learn about 4 steps you can take as a security professional to ensure that security doesn't take a backseat to speed.
Posted: 16 Mar 2021 | Published: 16 Mar 2021

Veracode, Inc.

Tips to Follow onYour AppSec Journey
sponsored by Veracode, Inc.
RESOURCE: Best practices don’t become best practices overnight. There are first steps to take for each, not least in application security. So for processes such as testing, shifting left and vulnerability management, how can you start? Access this infographic to learn 5 AppSec best practices and 5 practical first steps to each.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

Veracode, Inc.

Leve raging AI to Automate Vulnerability Management
sponsored by Dell SecureWorks
DATA SHEET: Today’s organizations need vulnerability management (VM) solutions that are built to maximize risk reduction. With the power of ML, these same organizations can minimize the manual burden on InfoSec and IT operations teams. Download this data sheet to explore how Secureworks’ VM solution strives to do all this and more.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Dell SecureWorks

Protecting Against the Hidden Threats of New Technologies
sponsored by Traceable
RESOURCE: Software development is being revolutionized by tools like GraphQL, but these new technologies also bring unknown security risks with them. Read this Traceable post to learn some of the biggest challenges facing modern application security, the shortcomings of legacy security, and strategies and solutions tackling this new wave of problems.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable

What AI can do for API Security
sponsored by Traceable
VIDEO: Join security and DevOps experts as they discuss how TraceAI from Traceable uses machine learning for cloud-native application security.
Posted: 17 Feb 2021 | Premiered: 17 Feb 2021

Traceable

API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4
sponsored by Traceable
WEBCAST: Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.
Posted: 17 Feb 2021 | Premiered: May 20, 2020

Traceable

Secure your GraphQL & gRPC APIs
sponsored by Traceable
VIDEO: In this webinar, security experts discuss how optimal application and API architecture requires the use of new protocols. Tune in as they cover the use of Traceable for cloud-native application visibility, protecting external and internal APIs from OWASP Top 10 risks, and more.
Posted: 12 Feb 2021 | Premiered: 12 Feb 2021

Traceable

What Runtime Application Self-Protection (RASP) Doesn’t Solve
sponsored by Traceable
RESOURCE: Tap into this article for RASP’s or Runtime Application Self-Protection’s, strengths and weaknesses in protecting against modern security threats.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Traceable

Traceable Overview CTA Demo
sponsored by Traceable
VIDEO: View this video overview of Traceable and how it uses security observability with artificial intelligence and machine learning to secure modern application architectures and their API's.
Posted: 12 Feb 2021 | Premiered: 12 Feb 2021

Traceable

AppSec Performance Package
sponsored by WhiteHat Security
DATA SHEET: Whether your team is creating its first AppSec program or searching for expert program management to move security left, WhiteHat Security’s AppSec Performance Package might be able to help. Save this data sheet to see how WhiteHat can help your team identify program risks and secure more applications in less time, with less in-house resources.
Posted: 10 Feb 2021 | Published: 10 Feb 2021

WhiteHat Security

AppSec Stats Flash Podcast EP.1 - AppSec Insights + Shared Responsibility = Secure Applications
sponsored by WhiteHat Security
VIDEO: In this episode of the AppSec Stats Flash podcast, join Setu Kulkarni, VP of Corporate Strategy and Business Development and Zach Jones, Sr. Director Security Research, as they dive into the first 3 key metrics of application security and explore the topic of shared responsibility for security. Listen here.
Posted: 10 Feb 2021 | Premiered: 10 Feb 2021

WhiteHat Security

Securing the (API) keys to the Kingdom
sponsored by Tyk
CASE STUDY: To keep API ecosystems secure and ensure active monitoring of API users, APIs need more than a simple gateway to function. Organizations are searching for API management solutions that prioritize authorization and authentication. Learn how companies are finding API security success here.
Posted: 09 Feb 2021 | Published: 09 Feb 2021

Tyk

11 Recommended Security Practices to Manage the Container Lifecycle
sponsored by VMware Tanzu
WHITE PAPER: Development, security, and operations leaders all share a common concern: application security across the software development lifecycle. The problem is, no team wants to fully claim this challenge as their own. Download this guide to learn about 11 security practices that everyone can get behind.
Posted: 04 Feb 2021 | Published: 04 Feb 2021

VMware Tanzu

Best Practices For Container Security
sponsored by VMware Tanzu
ANALYST REPORT: Traditional security tools aren’t cutting it in the world of containers. Luckily, this Forrester report identifies the security strategies and alternatives that do work in a container environment. Get started now—explore the best practices for container security here.
Posted: 03 Feb 2021 | Published: 03 Feb 2021

VMware Tanzu

Understand the OWASP Top 10 & How WAFs Can Mitigate Them
sponsored by Radware
EBOOK: Since 2003, the Open Web Application Security Project (OWASP) has put together a list of the top 10 security vulnerabilities posing the biggest risk to organizations. Access this e-book to see the current list and discover how web application firewalls (WAFs) can manage these vulnerabilities head-on.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Radware

Enable And Educate Your Team
sponsored by WhiteHat Security
WHITE PAPER: The reality for many companies is that they’re only at risk for breaches from common, easily-preventable attacks because their teams didn’t get the right security training. Check out the WhiteHat Security eLearning Platform program here to see if it’s the right fit for your teams.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

WhiteHat Security

One Of The World’S Largest Fast-Food Chains Secures Business-Critical Applications With Whitehat Security
sponsored by WhiteHat Security
CASE STUDY: In this case study, learn how one of the world’s largest fast-food chains succeeded in implemented ongoing testing and monitoring of their business-critical applications to proactively defend themselves from application-specific attacks. Get the details here.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

WhiteHat Security

WhiteHat Security Video
sponsored by WhiteHat Security
WEBCAST: When and where do you think about security? In this exclusive webinar series, join WhiteHat Security and TIBCO experts as they discuss what it means to be in the fast lane of developing and delivering modern—and secure—SaaS products. Tune in to the conversation here.
Posted: 14 Jan 2021 | Premiered: Sep 30, 2020

WhiteHat Security

Enabling A Sase Approach To Private Application Access And Security
sponsored by Axis Security
WHITE PAPER: Enterprises still lag in delivering and securing private applications to business users due to legacy security and access methods. Some businesses bring their legacy apps to the cloud, but these ‘cloudified’ apps still tend to underperform. Stop living in the past – check out this white paper on the Application Access Cloud by Axis Security.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

Application Evolution
sponsored by WhiteHat Security
VIDEO: In this video, learn how the nature of IT security is changing and what that means for the roles and expertise required inside your organization, so you can successfully secure your applications – and your future.
Posted: 14 Dec 2020 | Premiered: 14 Dec 2020

WhiteHat Security
1 - 25 of 89 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences