IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Programming

RSS Feed   
Secure Programming Reports
 
Technology Insight for Software Composition Analysis
sponsored by Sonatype
ANALYST REPORT: In this exclusive Gartner report, learn how security and risk management teams can better account for open-source security. The report explores 5 key findings on open-source security and provides 4 concrete recommendations on where security leaders can start.
Posted: 10 Sep 2020 | Published: 01 Nov 2019

Sonatype

Computer Weekly buyer's guide to mobile app development
sponsored by ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

ComputerWeekly.com

How Can We Integrate Security into DevOps and Infrastructure as Code Pipelines?
sponsored by Trend Micro
WHITE PAPER: As attack surfaces grow larger, it’s critical to incorporate security into every aspect of an organization. The emergence of DevSecOps enables the automation of security within the software development lifecycles, but implementation can be tricky. Download this white paper for recommendations and best practices.
Posted: 19 Jun 2020 | Published: 19 Jun 2020

Trend Micro

Application Security: The Easy Way
sponsored by Ionic Security
RESOURCE: Securing internal applications is a top priority among IT security teams. Yet achieving it is time & resource consuming. In fact, 76% of total IT expenditure is spent on securing internal apps. It doesn’t need to be so difficult – this blog post highlights how Ionic’s data-centric Machina Tools may be able to help. Read on to learn more.
Posted: 03 Mar 2020 | Published: 16 Aug 2018

Ionic Security

How to Secure APIs at DevOps Speed
sponsored by Contrast Security
WHITE PAPER: API vulnerabilities are becoming the most popular target for attacks, as traditional security measures often fail to protect APIs. Luckily, API security isn’t as far away as you think. In this eBook, learn how to begin an instrumentation-based approach to DevOps and API security.
Posted: 20 Aug 2020 | Published: 20 Aug 2020

Contrast Security

Cloud One™ - Application Security
sponsored by Trend Micro
DATA SHEET: As businesses realign to cloud-native application architectures, it’s imperative to keep security at the top of the list of priorities. To learn how application security can integrate into your application delivery and customer satisfaction, download this data sheet now.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

Trend Micro

Automated Security at the Speed of DevOps
sponsored by Trend Micro
WHITE PAPER: Today, businesses of all sizes have built an advantage by implementing a DevOps culture and processes. This e-book highlights the main challenges businesses face at the intersection of DevOps and security and offers best practices for integrating security within your development processes from the start.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

Trend Micro

State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Veracode, Inc.

Buyer's Essentials: What to Look for in an EMM Strategy
sponsored by SearchSecurity.com
EBOOK: EMM products can contain a variety of features - for mobile device management, mobile app management, mobile content management and more. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

SearchSecurity.com

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info