IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Software Development

RSS Feed   
Secure Software Development Reports
Container Security 101: Understanding the Basics of Securing Containers
sponsored by Palo Alto Networks
WHITE PAPER: Container environments bring a range of cybersecurity issues involving images, containers, hosts, runtimes, registries, and orchestration platforms, which all need to be secured. Not sure where to begin? Download Container Security 101: Understanding the Basics of Securing Containers for everything you need to know.
Posted: 08 Jun 2020 | Published: 08 Jun 2020

Palo Alto Networks

Secure your GraphQL & gRPC APIs
sponsored by Traceable
VIDEO: In this webinar, security experts discuss how optimal application and API architecture requires the use of new protocols. Tune in as they cover the use of Traceable for cloud-native application visibility, protecting external and internal APIs from OWASP Top 10 risks, and more.
Posted: 12 Feb 2021 | Premiered: 12 Feb 2021


What AI can do for API Security
sponsored by Traceable
VIDEO: Join security and DevOps experts as they discuss how TraceAI from Traceable uses machine learning for cloud-native application security.
Posted: 17 Feb 2021 | Premiered: 17 Feb 2021


State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: In their 11th official State of Software Security report, Veracode looks at what kind of impact the decisions developers make have on software security. Explore the top security concerns of the year—and learn how to navigate around them—here.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Veracode, Inc.

sponsored by Contrast Security
WHITE PAPER: Agile and DevOps methodologies have brought incredible innovation to the software development lifecycle. However, innovation comes with certain risks. Legacy security tools aren’t keeping pace with modern software development and the increasingly advanced threat landscape within. Learn to move forward securely in this application security guide.
Posted: 22 Jan 2021 | Published: 22 Jan 2021

Contrast Security

Open discussion panel Securing your IT environments through open technology
sponsored by Red Hat
WEBCAST: Approaching DevSecOps is a journey that involves people, processes, and technologies working together to implement security and compliance within each layer of the application and infrastructure stack and life cycle. Listen to Paul Costall, Simon Cashmore and Mike Bursell during the discussion moderated by Massimo Ferrari about their experiences.
Posted: 28 Jan 2021 | Premiered: Jan 28, 2021

Red Hat

Beating web application security threats
sponsored by
EGUIDE: Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability.
Posted: 14 Nov 2011 | Published: 31 Oct 2011

sponsored by Contrast Security
WHITE PAPER: Apps require better collaboration between development and security. In fact, Contrast Security found that 55% of security professionals said it is difficult to get development teams to prioritize remediation of vulnerabilities—even if it’s a performance metric for developers. Learn how to get everyone on board with security in this report.
Posted: 22 Jan 2021 | Published: 22 Jan 2021

Contrast Security

Application Evolution
sponsored by WhiteHat Security
VIDEO: In this video, learn how the nature of IT security is changing and what that means for the roles and expertise required inside your organization, so you can successfully secure your applications – and your future.
Posted: 14 Dec 2020 | Premiered: 14 Dec 2020

WhiteHat Security

4 Ways to Increase Developer Buy-In of AppSec
sponsored by Veracode, Inc.
RESOURCE: Security developers have been doing their best to implement proper security measures, but since their performance is often tied to the rate of deployments, speed tends to take precedence.Access this article to learn about 4 steps you can take as a security professional to ensure that security doesn't take a backseat to speed.
Posted: 16 Mar 2021 | Published: 16 Mar 2021

Veracode, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info