IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Software Development

RSS Feed   
Secure Software Development Reports
 
Qualcomm's Alex Gantman on Bug Bounties
sponsored by HackerOne
CASE STUDY: Qualcomm's technologies are powering the world of connected devices. But since Qualcomm's technology isn't the end product, it's difficult to determine the root of a device's vulnerability. In this case study, see what the VP of Engineering at Qualcomm, had to say about the company's approach to bug bounties and hacker-powered security.
Posted: 14 Jun 2019 | Published: 22 Jun 2017

HackerOne

Circumventing a Blacklist to Exploit Cross-Site Scripting
sponsored by WhiteHat Security
PRODUCT OVERVIEW: Discover how a cross-site scripting (XSS) vulnerability was found during an assessment of a financial services website and how the tester managed to get around the malicious script.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

WhiteHat Security

The 2019 Security Strategy
sponsored by Cloudflare
VIDEO: How are you planning to secure your employees, your company, and your customers in 2019? Watch this webinar to hear from Cloudfare CSO Joe Sullivan on the core strategies he uses to help protect Cloudfare, and—as a result—its 12M domains that rely on it for security and performance.
Posted: 22 Jan 2019 | Premiered: 17 Jan 2019

Cloudflare

Application Shielding with Intertrust whiteCriterion Code Protection
sponsored by Intertrust
WHITE PAPER: Traditional parameter security measures lack the flexibility needed to meet mobile and IoT security risks. This white paper goes in-depth into the specific security challenges hackers are using to expose application vulnerabilities and defines the tactics and tools that can be implemented to mitigate these risks.
Posted: 17 Dec 2019 | Published: 31 Aug 2018

Intertrust

Automated Security at the Speed of DevOps
sponsored by Trend Micro, Inc.
WHITE PAPER: As organizations implement DevOps on AWS, they need to understand the security implications. In this white paper, explore the main challenges businesses face at the intersection of DevOps and security. Also, learn best practices for integrating security within your development process from the start.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Trend Micro, Inc.

RingCentral Case Study
sponsored by Data Theorem
CASE STUDY: RingCentral did not have the experts or a scalable platform to provide security coverage for their mobile apps. However, they have a requirement with their customers and partners to perform third-party security testing for all of their apps. In this case study, learn how RingCentral was able to address this issue using Data Theorem's App Secure.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Data Theorem

Optimize Business and IT With New Generation Application Lifecycle Management
sponsored by SAP Community Network
WEBCAST: This webcast provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
Posted: 15 Sep 2009 | Premiered: Sep 30, 2009, 12:00 EDT (16:00 GMT)

SAP Community Network

Mastering Mobile Application Management: How to Adopt MAM
sponsored by IBM
EBOOK: Enhance your MAM understanding with proven best practices that'll help you to solve app compatibility, security, and adoption issues.
Posted: 24 Mar 2015 | Published: 24 Mar 2015

IBM

Presentation Transcript: Three Reasons Why Security Fails and What to Do About It
sponsored by Sophos
PRESENTATION TRANSCRIPT: Web security seems to get tougher every year. Dynamic content, user generated content, and social networking increase the complexity of securing hosted web servers. Read this presentation transcript to learn about the latest web threats, which ones to be most concerned with, and what IT pros should do to help prevent them.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

Sophos

E-Book: Technical Guide on Application Security: Secure Development
sponsored by IBM
EBOOK: When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info