IT Management  >   Systems Design and Development  >   Application Development  >  

Secure Software Development

RSS Feed   
Secure Software Development Reports
 
Application Security Evolved: How to Use Attacker-Centric Security to Fix the WAF
sponsored by ThreatX
WHITE PAPER: Download this white paper for a security team's guide to the current state of web application security.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

ThreatX

When it Comes to Securing Your Open Source Components, WhiteSource Has You Fully Covered
sponsored by WhiteSource
WHITE PAPER: Open source components are the core building blocks of modern applications. However, development teams have been neglectful when it comes to ensuring that they meet basic security standards. In this white paper, learn about open source security challenges, the two pillars of open source security and why automation is king.
Posted: 08 Jan 2019 | Published: 08 Jan 2019

WhiteSource

From Agile Development to DevOps to DevSecOps
sponsored by Veracode, Inc.
WEBCAST: A DevSecOps process is the best way to ensure you're developing high quality applications with security in mind. Learn how to approach DevSecOps in this quick video.
Posted: 28 Feb 2019 | Premiered: Feb 28, 2019

Veracode, Inc.

Secure App Development: Success Story
sponsored by Micro Focus
WEBCAST: Tune into this webcast to learn about a security tool that was designed for developers and allows developers to jump into the tool at any point to create a secure software development lifecycle program.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019

Micro Focus

A New Security Strategy that Protects the Organization When Work Is Happening from Anywhere
sponsored by Citrix
RESOURCE: The concept of the "digital perimeter" has changed dramatically. Protecting the perimeter by building a wall too keep the bad guys out is no longer appropriate because of mobility, the cloud and constant remote access to internal systems. In this resource, learn how to better secure your organization against increasingly sophisticated attacks.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

Citrix

2012 Cost of Cyber Crime Study: UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors.
Posted: 25 Oct 2012 | Published: 25 Oct 2012

ComputerWeekly.com

Static Analysis and the Truth About False Positives
sponsored by WhiteHat Security
PRODUCT OVERVIEW: Learn the truth behind false positives and how a source code scanning technology that is not programmed with assumptions can help your application security program today.
Posted: 04 Mar 2019 | Published: 04 Mar 2019

WhiteHat Security

The Beginners' Guide to Hacker-Powered Security
sponsored by HackerOne
WHITE PAPER: Leveraging the wisdom and power of the vast white-hat hacker community is a new security expectation. In this white paper, learn the best practices for starting and running effective disclosure and bug bounty programs, and how to integrate hacker-powered security into your organization.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

HackerOne

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper, CSO explores why desktop virtualization should be core to your information security foundation.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix

Empower your Developers
sponsored by Coverity by Synopsys
WHITE PAPER: The repercussions of releasing unsecure software in today’s markets are severe – due in large part to the proliferation of constantly-connected, mobile devices. This white paper provides an overview of these challenges, and demonstrates the steps you can take to arm your developers against the risks of modern application development.
Posted: 16 May 2011 | Published: 16 May 2011

Coverity by Synopsys
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement