IT Management  >   Systems Design and Development  >   Application Development  >  

Security Development Lifecycle

RSS Feed   
Security Development Lifecycle Reports
 
CW APAC - November 2019: Expert advice on container security
sponsored by ComputerWeekly.com
EZINE: For all the promises of containers, changes in architectureand practices associated with the technology bring newchallenges and opportunities. In this handbook, Computer Weekly looks at the security challenges associated with container technology. Read the issue now.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

ComputerWeekly.com

Secrets to a Stronger Strategy for Container Security
sponsored by Alert Logic
WHITE PAPER: AlertLogic experts have developed, tested, and refined 8 best practices for security in your environment. Read on for more explanation of these practices and some tips for how your Amazon Web Services (AWS) environment can help.
Posted: 17 Oct 2019 | Published: 17 Oct 2019

Alert Logic

The DevOps-Ready Security Program
sponsored by Contrast Security
WHITE PAPER: Extending DevOps to your software application security team shifts security from being a bottleneck to an enabler. Successful security teams take a risk-based approach to enable product development without being a blocker or being left behind. In this white paper, explore 6 tips for an executive to bring security into the DevOps era.
Posted: 23 Jul 2019 | Published: 23 Jul 2019

Contrast Security

2012 Cost of Cyber Crime Study: UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors.
Posted: 25 Oct 2012 | Published: 25 Oct 2012

ComputerWeekly.com

Real-World Customer with Secure Application Infrastructure
sponsored by VMware
WHITE PAPER: In this white paper, learn about secure application infrastructure, which architects security controls directly into the networks and endpoints where applications live—enabling protection to follow apps wherever they go. Also explore features of secure application infrastructure, as well as use cases for education, healthcare and more.
Posted: 18 Jun 2019 | Published: 31 Jul 2018

VMware

Presentation Transcript: Three Reasons Why Security Fails and What to Do About It
sponsored by Sophos
PRESENTATION TRANSCRIPT: Web security seems to get tougher every year. Dynamic content, user generated content, and social networking increase the complexity of securing hosted web servers. Read this presentation transcript to learn about the latest web threats, which ones to be most concerned with, and what IT pros should do to help prevent them.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

Sophos

An Exclusive Guide for Promoting Enterprise Mobility Management
sponsored by SearchMobileComputing
EBOOK: This e-book takes readers through the process of enabling and managing a secure mobile workforce. Access this resource to understand how mobility can increase agility—and why security concerns, while important, shouldn't stop mobility in your organization from taking off.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

SearchMobileComputing

Webcast: How Security is well suited for Agile development
sponsored by IBM
WEBCAST: View this webcast as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and how security is linked to the software development lifecycle.
Posted: 15 Jun 2011 | Premiered: Jun 15, 2011

IBM

End-to-End Secure Client to Cloud Access
sponsored by Intel
WEBCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

The Essential Guide for Threat Intelligence Services: What to Look For
sponsored by SearchSecurity.com
EBOOK: This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement