Container Security 101: Understanding the Basics of Securing Containers
sponsored by Palo Alto Networks
WHITE PAPER:
Container environments bring a range of cybersecurity issues involving images, containers, hosts, runtimes, registries, and orchestration platforms, which all need to be secured. Not sure where to begin? Download Container Security 101: Understanding the Basics of Securing Containers for everything you need to know.
Posted: 08 Jun 2020 | Published: 08 Jun 2020
|
|
|
Secure your GraphQL & gRPC APIs
sponsored by Traceable
VIDEO:
In this webinar, security experts discuss how optimal application and API architecture requires the use of new protocols. Tune in as they cover the use of Traceable for cloud-native application visibility, protecting external and internal APIs from OWASP Top 10 risks, and more.
Posted: 12 Feb 2021 | Premiered: 12 Feb 2021
|
|
|
What AI can do for API Security
sponsored by Traceable
VIDEO:
Join security and DevOps experts as they discuss how TraceAI from Traceable uses machine learning for cloud-native application security.
Posted: 17 Feb 2021 | Premiered: 17 Feb 2021
|
|
|
State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER:
In their 11th official State of Software Security report, Veracode looks at what kind of impact the decisions developers make have on software security. Explore the top security concerns of the year—and learn how to navigate around them—here.
Posted: 03 Nov 2020 | Published: 03 Nov 2020
|
|
|
ADVANCED THREAT LANDSCAPE AND LEGACY APPLICATION SECURITY RATCHET UP RISK
sponsored by Contrast Security
WHITE PAPER:
Agile and DevOps methodologies have brought incredible innovation to the software development lifecycle. However, innovation comes with certain risks. Legacy security tools aren’t keeping pace with modern software development and the increasingly advanced threat landscape within. Learn to move forward securely in this application security guide.
Posted: 22 Jan 2021 | Published: 22 Jan 2021
|
|
|
Open discussion panel Securing your IT environments through open technology
sponsored by Red Hat
WEBCAST:
Approaching DevSecOps is a journey that involves people, processes, and technologies working together to implement security and compliance within each layer of the application and infrastructure stack and life cycle. Listen to Paul Costall, Simon Cashmore and Mike Bursell during the discussion moderated by Massimo Ferrari about their experiences.
Posted: 28 Jan 2021 | Premiered: Jan 28, 2021
|
|
|
Beating web application security threats
sponsored by SearchSecurity.com
EGUIDE:
Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability.
Posted: 14 Nov 2011 | Published: 31 Oct 2011
|
|
|
DEVELOPERS NEED INTEGRATED APPLICATION SECURITY TOOLING
sponsored by Contrast Security
WHITE PAPER:
Apps require better collaboration between development and security. In fact, Contrast Security found that 55% of security professionals said it is difficult to get development teams to prioritize remediation of vulnerabilities—even if it’s a performance metric for developers. Learn how to get everyone on board with security in this report.
Posted: 22 Jan 2021 | Published: 22 Jan 2021
|
|
|
Application Evolution
sponsored by WhiteHat Security
VIDEO:
In this video, learn how the nature of IT security is changing and what that means for the roles and expertise required inside your organization, so you can successfully secure your applications – and your future.
Posted: 14 Dec 2020 | Premiered: 14 Dec 2020
|
|
|
4 Ways to Increase Developer Buy-In of AppSec
sponsored by Veracode, Inc.
RESOURCE:
Security developers have been doing their best to implement proper security measures, but since their performance is often tied to the rate of deployments, speed tends to take precedence.Access this article to learn about 4 steps you can take as a security professional to ensure that security doesn't take a backseat to speed.
Posted: 16 Mar 2021 | Published: 16 Mar 2021
|
|
|
|
|