IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Programming

RSS Feed   
Secure Programming Reports
 
Secure Software Development in the Financial Services Industry
sponsored by GitHub
RESOURCE: Find out how financial service institutions (FSIs) can meet strict security regulations and create a culture of truly secure software development to deliver the best possible products while safeguarding customer data.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

GitHub

Why Websites Stay Vulnerable: And What You Can Do About It
sponsored by WhiteHat Security
WEBCAST: There have been a number of data breaches in the news recently due to website vulnerabilities. In order to ensure your business isn't breached, incorporate security into your development process. In this webcast, explore key considerations for securing your web applications.
Posted: 01 Mar 2019 | Premiered: Mar 1, 2019

WhiteHat Security

How to Automate an API Security Program
sponsored by Data Theorem
WEBCAST: Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.
Posted: 10 Jun 2019 | Premiered: Jun 10, 2019

Data Theorem

The Beginners' Guide to Hacker-Powered Security
sponsored by HackerOne
WHITE PAPER: Leveraging the wisdom and power of the vast white-hat hacker community is a new security expectation. In this white paper, learn the best practices for starting and running effective disclosure and bug bounty programs, and how to integrate hacker-powered security into your organization.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

HackerOne

Build Application Security into the Entire SDLC
sponsored by Micro Focus
WHITE PAPER: 84% of security breaches exploit vulnerabilities at the application layer. And, software security is still an afterthought for developers. In this white paper, discover how Fortify Security Assistant empowers developers to take responsibility for their own code by finding and fixing application security defects during the coding process.
Posted: 29 Jan 2019 | Published: 31 Aug 2018

Micro Focus

Building Secure Software
sponsored by Trend Micro, Inc.
WEBCAST: Building securely doesn't just mean the code you are creating is high quality and doesn't have any obvious security vulnerabilities; it's more complicated than that. You have to account for that complexity when checking for vulnerabilities. In this webcast, listen as Mark Nunnikhoven of Trend Micro discusses how to build securely.
Posted: 03 Apr 2019 | Premiered: Apr 3, 2019

Trend Micro, Inc.

E-Book: Technical Guide on Application Security: Secure Development
sponsored by IBM
EBOOK: When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

IBM

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper, CSO explores why desktop virtualization should be core to your information security foundation.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix

An Integrated Approach to Managing Application Security
sponsored by IBM
WHITE PAPER: This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement