IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Software Development

RSS Feed   
Secure Software Development Reports
 
Market Guide for Cloud Workload Protection Platforms
sponsored by Capsule8
ANALYST REPORT: Gartner’s 2020 Market Guide for Cloud Workload Protection Platforms dives into the latest developments in cloud native infrastructure security and offers recommendations on how enterprises can protect these components and as well as VMs, containers, and serverless workloads.
Posted: 26 Jun 2020 | Published: 26 Jun 2020


Wavefront Secures DevOps Environments at Scale with Lacework
sponsored by Lacework
CASE STUDY: Due to the continually changing nature of their public cloud environment, Wavefront was facing visibility and security issues related to detecting and tracking vulnerabilities and threats. Download this white paper to see what led to their partnership with Lacework, as well as the results.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

Lacework

Using the AWS Well-Architected Framework to Support DevSecOps
sponsored by nClouds
RESOURCE: In this blog, discover strategies for applying guidelines from the AWS Well-Architected Framework in a low-friction way to make it easier to prioritize security and advance your DevSecOps approach.
Posted: 25 Sep 2019 | Published: 19 Nov 2018

nClouds

Top 7 Reasons Why Organizations Choose WhiteHat Security
sponsored by WhiteHat Security
RESOURCE: In this infographic, find out the top 7 reasons organizations choose to work with WhiteHat Security.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

WhiteHat Security

Cloud One™ - Application Security
sponsored by Trend Micro
DATA SHEET: As businesses realign to cloud-native application architectures, it’s imperative to keep security at the top of the list of priorities. To learn how application security can integrate into your application delivery and customer satisfaction, download this data sheet now.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

Trend Micro

Top Five Challenges in Protecting APIs
sponsored by Wallarm
WHITE PAPER: APIs represent the core set of functionalities for modular applications today—consequently, protecting these APIs is now high priority. In this guide, learn what key issues need to be considered to ensure API security and robustness, from complicated data protocols to the difference between good and bad payloads.
Posted: 18 Mar 2020 | Published: 18 Mar 2020

Wallarm

E-Book: Technical Guide on Application Security: Secure Development
sponsored by IBM
EBOOK: When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

IBM

How to Secure Your Microsoft SharePoint Products
sponsored by Thawte Inc.
EGUIDE: This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order.
Posted: 22 May 2013 | Published: 22 May 2013

Thawte Inc.

A Guide to Joining DevOps and Security
sponsored by Trend Micro, Inc.
EGUIDE: If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
Posted: 09 May 2019 | Published: 03 May 2019

Trend Micro, Inc.

Presentation Transcript: How Security is Well Suited for Agile Development
sponsored by IBM
PRESENTATION TRANSCRIPT: View this presentation transcript as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and learn how security is linked to the software development lifecycle.
Posted: 21 Jun 2011 | Published: 21 Jun 2011

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info