IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Programming

RSS Feed   
Secure Programming Reports
 
THE FOUR BIGGEST CHALLENGES TO KEEPING MODERN APPLICATIONS SECURE
sponsored by Radware
WHITE PAPER: According to a recent study, just 33% of organizations feel their web application firewall (WAF) addresses all application-targeted threats. While implementing a WAF is an important starting point for ensuring the protection of modern apps, there are other key challenges and threats to consider. Download this report to learn more.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

Radware

A Comprehensive Approach to DevSecOps
sponsored by Contrast Security
WHITE PAPER: More than half of organizations in a recent study say that their security team has reached a tipping point where the number of security tools in place has adversely impacted their security posture and increased risk. Stuck in the AppSec tool swamp? Learn about a unified AppSec platform that can alleviate this problem.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

Contrast Security

DEVELOPERS NEED INTEGRATED APPLICATION SECURITY TOOLING
sponsored by Contrast Security
WHITE PAPER: Apps require better collaboration between development and security. In fact, Contrast Security found that 55% of security professionals said it is difficult to get development teams to prioritize remediation of vulnerabilities—even if it’s a performance metric for developers. Learn how to get everyone on board with security in this report.
Posted: 22 Jan 2021 | Published: 22 Jan 2021

Contrast Security

Open discussion panel Securing your IT environments through open technology
sponsored by Red Hat
WEBCAST: Approaching DevSecOps is a journey that involves people, processes, and technologies working together to implement security and compliance within each layer of the application and infrastructure stack and life cycle. Listen to Paul Costall, Simon Cashmore and Mike Bursell during the discussion moderated by Massimo Ferrari about their experiences.
Posted: 28 Jan 2021 | Premiered: Jan 28, 2021

Red Hat

AppSec Stats Flash Podcast EP.1 - AppSec Insights + Shared Responsibility = Secure Applications
sponsored by WhiteHat Security
VIDEO: In this episode of the AppSec Stats Flash podcast, join Setu Kulkarni, VP of Corporate Strategy and Business Development and Zach Jones, Sr. Director Security Research, as they dive into the first 3 key metrics of application security and explore the topic of shared responsibility for security. Listen here.
Posted: 10 Feb 2021 | Premiered: 10 Feb 2021

WhiteHat Security

SecOps 101
sponsored by ServiceNow
EGUIDE: Find out everything you need to know about SecOps and DevSecOps inside this expert guide.
Posted: 10 May 2021 | Published: 07 May 2021

ServiceNow

How to Secure APIs at DevOps Speed
sponsored by Contrast Security
WHITE PAPER: API vulnerabilities are becoming the most popular target for attacks, as traditional security measures often fail to protect APIs. Luckily, API security isn’t as far away as you think. In this eBook, learn how to begin an instrumentation-based approach to DevOps and API security.
Posted: 20 Aug 2020 | Published: 20 Aug 2020

Contrast Security

DevSecOps: Putting the Security in DevOps
sponsored by Sonatype
EGUIDE: Security in DevOps, aptly named DevSecOps, is something that your development organization is going to have to deal with soon. This e-guide is your primer to bringing these two departments together when they come from such different perspectives. Learn how to improve collaboration, incorporate security earlier in development, and more.
Posted: 08 May 2017 | Published: 04 May 2017

Sonatype

Blog: DevOps for the mainframe
sponsored by IBM
WHITE PAPER: Learn the basics of DevOps and important information you need to know in order to create a successful strategy.
Posted: 18 Oct 2013 | Published: 18 Apr 2013

IBM

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences