IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Programming

RSS Feed   
Secure Programming Reports
 
Market Guide for Application Shielding
sponsored by Arxan
RESEARCH CONTENT: Protecting applications that run within untrusted environments is crucial as mobile, IoT and modern web applications migrate software logic to the client side. Application shielding is well-suited to protect consumer mobile apps. Download this Gartner research report to learn more about application shielding.
Posted: 14 Feb 2019 | Published: 27 Jun 2018

Arxan

The State of Software Security: Developer Guide
sponsored by Veracode, Inc.
WHITE PAPER: This State of Software Security report examines the increased burden on developers to ensure sound app security testing, particularly in DevOps and Agile environments. Discover best practices to improve app security testing and remediation, and learn about the tenets of DevSecOps.
Posted: 12 Jan 2018 | Published: 31 Dec 2017

Veracode, Inc.

A Patch Made in Heaven
sponsored by Kaseya
WHITE PAPER: As breaches become more prevalent, IT professionals must accept patch management for what it is — a way to create a robust security layer with the routine and timely installation of patches. Time being the most critical element. In this white paper, learn about 3 critical components to any effective patch management strategy.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

Kaseya

Strategies for Improving Enterprise Application Security
sponsored by WhiteSource
WEBCAST: While most enterprises are focused on application scanning and remediation, many software development experts are advocating better, more secure application development initiatives that prevent vulnerabilities from occurring in the first place. In this webcast, experts discuss steps to integrate security into the app development process.
Posted: 15 Jan 2019 | Premiered: Mar 13, 2018

WhiteSource

Containers at Risk: A Review of 21,000 Cloud Environments
sponsored by Lacework
WHITE PAPER: This report describes the risks and threats that can be created by deploying workload in the public cloud without proper security. Read on to learn about platforms discovered such as Kubernetes, Docker Swarm, Redhat Openshift, and more.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Lacework

Gain Security Visibility and Strengthen HIPAA Compliance with the AWN CyberSOC Service
sponsored by Arctic Wolf
CASE STUDY: Download this case study to learn why Bethesda Health Group chose to implement Arctic Wolf's AWN CyberSOC to protect their network, while helping them reach their HIPAA compliance goals and prevent cyberattacks.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Arctic Wolf

Enforcing Immutability & Least Privilege to Secure Containerized Applications on Openshift
sponsored by Aqua Security
WEBCAST: In this webinar, learn more on how you can secure your containers with an approach that enforces immutability and least privilege.
Posted: 18 Jan 2019 | Premiered: Jan 16, 2019

Aqua Security

Application Security and How to Improve it
sponsored by WhiteHat Security
WHITE PAPER: UBM conducted an online survey to explore common trends and challenges in app security, and to understand how security and development teams can work together to close these gaps. Click here for an inside look at the survey results.
Posted: 06 Mar 2019 | Published: 31 Dec 2018

WhiteHat Security

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Presentation Transcript: Are your applications cloud-ready?
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript discusses the importance of application security, and describes the tools and processes you should be putting in place to ensure that your applications are secure as you move them to the cloud.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement