IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Software Development

RSS Feed   
Secure Software Development Reports
 
Gain Security Visibility and Strengthen HIPAA Compliance with the AWN CyberSOC Service
sponsored by Arctic Wolf
CASE STUDY: Download this case study to learn why Bethesda Health Group chose to implement Arctic Wolf's AWN CyberSOC to protect their network, while helping them reach their HIPAA compliance goals and prevent cyberattacks.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Arctic Wolf

Arxan Threat Analytics
sponsored by Arxan
PRODUCT OVERVIEW: The need has never been greater to protect apps that drive the economy. Securing these business critical apps against exploits is key to preventing brand damage, financial loss, intellectual property theft and government penalties. In this solution brief, learn how Arxan provides app-level security to protect against a range of threats.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Arxan

The Journey of Security in a DevOps Environment
sponsored by F5 Networks
WHITE PAPER: To address the increasing demand for application delivery, organizations are adopting DevSecOps: combining the efficiency of DevOps with modern security practices. But how can security be incorporated without disturbing the development process? In this article, uncover the benefits of incorporating security into your DevOps environment.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

F5 Networks

The State of Web Application Security
sponsored by Radware
WHITE PAPER: Download this white paper on web application security for a summary of current global perceptions on the state of application attacks, and insights on how to best identify and mitigate threats in the future.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

Radware

2018 Global Study on Application Security
sponsored by Arxan
RESEARCH CONTENT: Ponemon Institute conducted a survey to understand the risk that unprotected applications pose to businesses when running in unsecured environments and how organizations are addressing this risk in practice. In this research report, learn about key findings from the survey.
Posted: 31 Dec 2019 | Published: 31 May 2018

Arxan

Automated Security at the Speed of DevOps
sponsored by Trend Micro
WHITE PAPER: Today, businesses of all sizes have built an advantage by implementing a DevOps culture and processes. This e-book highlights the main challenges businesses face at the intersection of DevOps and security and offers best practices for integrating security within your development processes from the start.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

Trend Micro

Beating Web Application Security Threats
sponsored by Thawte Inc.
EBOOK: The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats.
Posted: 18 Mar 2010 | Published: 18 Mar 2010

Thawte Inc.

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Presentation Transcript: Optimize Business and IT with New Generation Application Lifecycle
sponsored by SAP Community Network
PRESENTATION TRANSCRIPT: This transcript provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
Posted: 26 Oct 2009 | Published: 26 Oct 2009

SAP Community Network

Empower your Developers
sponsored by Coverity by Synopsys
WHITE PAPER: The repercussions of releasing unsecure software in today’s markets are severe – due in large part to the proliferation of constantly-connected, mobile devices. This white paper provides an overview of these challenges, and demonstrates the steps you can take to arm your developers against the risks of modern application development.
Posted: 16 May 2011 | Published: 16 May 2011

Coverity by Synopsys
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info