IT Management  >   Systems Design and Development  >   Application Development  >  

Security Development Lifecycle

RSS Feed   
Security Development Lifecycle Reports
A Comprehensive Approach to DevSecOps
sponsored by Contrast Security
WHITE PAPER: More than half of organizations in a recent study say that their security team has reached a tipping point where the number of security tools in place has adversely impacted their security posture and increased risk. Stuck in the AppSec tool swamp? Learn about a unified AppSec platform that can alleviate this problem.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

Contrast Security

Protecting Against the Hidden Threats of New Technologies
sponsored by Traceable
RESOURCE: Software development is being revolutionized by tools like GraphQL, but these new technologies also bring unknown security risks with them. Read this Traceable post to learn some of the biggest challenges facing modern application security, the shortcomings of legacy security, and strategies and solutions tackling this new wave of problems.
Posted: 22 Feb 2021 | Published: 22 Feb 2021


Securing the Entire Software Development Pipeline with Veracode Static Analysis
sponsored by Veracode, Inc.
WHITE PAPER: Developers need security testing solutions that can keep the pace with rapid, agile development processes. Traditional AppSec solutions can cause development to stall and delay the release of software. In this guide, learn how static analysis solutions can secure applications without hindering fast development.
Posted: 06 May 2020 | Published: 06 May 2020

Veracode, Inc.

Securing Red Hat OpenShift Containerized Applications at Enterprise Scale
sponsored by Red Hat
WEBCAST: Over 90% of Fortune 500 companies leverage Red Hat products and solutions – one of which is their OpernShift platform for containerized applications. Professionals looking to add additional security for OpenShift should leverage this webinar detailing how CyberArk’s out-of-the-box integrations can help, demo included.
Posted: 13 Apr 2021 | Premiered: Jun 24, 2020

Red Hat

Solving Kubernetes Security Challenges Using Red Hat OpenShift and Sysdig
sponsored by Red Hat
WEBCAST: Kubernetes accelerates application delivery, but it can also complicate security, visibility and compliance. With the right solutions, DevOps teams can reap the benefits of cloud-native infrastructure and keep risk low. Access this webinar to learn how 3 global companies avoided security and compliance issues using Red Hat OpenShift and Sysdig.
Posted: 09 Apr 2021 | Premiered: Dec 17, 2020

Red Hat

What Runtime Application Self-Protection (RASP) Doesn’t Solve
sponsored by Traceable
RESOURCE: Tap into this article for RASP’s or Runtime Application Self-Protection’s, strengths and weaknesses in protecting against modern security threats.
Posted: 12 Feb 2021 | Published: 12 Feb 2021


A Layered Approach To Container And Kubernetes Security
sponsored by Red Hat
WHITE PAPER: Comprehensive container and Kubernetes security is all about layers. As with securing Linux processes, you’ll have to think through the layers of the solution stack before deploying and running any container. In this 16-page Red Hat guide, explore the key elements of security for containerized applications. Save the guide here for reference.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

Red Hat

sponsored by Contrast Security
WHITE PAPER: Since APIs are the “connective tissue” that holds together the different parts of software, securing them is a critical priority for any organization. With this guide, learn how to embrace API security without overwhelming your team. Get started here.
Posted: 21 Jan 2021 | Published: 21 Jan 2021

Contrast Security

DevSecOps: Putting the Security in DevOps
sponsored by Sonatype
EGUIDE: Security in DevOps, aptly named DevSecOps, is something that your development organization is going to have to deal with soon. This e-guide is your primer to bringing these two departments together when they come from such different perspectives. Learn how to improve collaboration, incorporate security earlier in development, and more.
Posted: 08 May 2017 | Published: 04 May 2017


Be a Web App Security Superhero
sponsored by
EBOOK: To secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.
Posted: 07 Apr 2015 | Published: 07 Apr 2015

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences