IT Management  >   Systems Design and Development  >   Application Development  >  

Security Development Lifecycle

RSS Feed   
Security Development Lifecycle Reports
 
4 Ways to Increase Developer Buy-In of AppSec
sponsored by Veracode, Inc.
RESOURCE: Security developers have been doing their best to implement proper security measures, but since their performance is often tied to the rate of deployments, speed tends to take precedence.Access this article to learn about 4 steps you can take as a security professional to ensure that security doesn't take a backseat to speed.
Posted: 16 Mar 2021 | Published: 16 Mar 2021

Veracode, Inc.

Securing Cloud-Native Kubernetes Applications
sponsored by Radware
WHITE PAPER: When businesses look to optimize and accelerate application development life cycles and deliver their applications in public clouds, security becomes a greater challenge. In this white paper, learn how to ensure the timely development and deployment of secure applications across hybrid computing environments.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

Radware

ADVANCED THREAT LANDSCAPE AND LEGACY APPLICATION SECURITY RATCHET UP RISK
sponsored by Contrast Security
WHITE PAPER: Agile and DevOps methodologies have brought incredible innovation to the software development lifecycle. However, innovation comes with certain risks. Legacy security tools aren’t keeping pace with modern software development and the increasingly advanced threat landscape within. Learn to move forward securely in this application security guide.
Posted: 22 Jan 2021 | Published: 22 Jan 2021

Contrast Security

Traceable Overview CTA Demo
sponsored by Traceable
VIDEO: View this video overview of Traceable and how it uses security observability with artificial intelligence and machine learning to secure modern application architectures and their API's.
Posted: 12 Feb 2021 | Premiered: 12 Feb 2021

Traceable

The State of Application Security
sponsored by WhiteHat Security
WEBCAST: Attackers continue to take advantage of application flaws to compromise organizations and put their customers at risk. This means that as much as Dev teams prioritize faster release cycles, it’s important that they don’t overlook security. In this WhiteHat webinar, examine the state of application security and what you can do to stay protected.
Posted: 09 Dec 2020 | Premiered: Dec 9, 2020

WhiteHat Security

Understanding Your Open Source Risk
sponsored by Veracode, Inc.
EBOOK: Developers are being asked to push out more software — and in shorter periods of time — than ever before. This has led to an increased reliance on open source libraries, and as this code is reused, it comes with a high risk of vulnerability. Access this e-book to learn more about the risks of open source and the challenges in securing it.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Veracode, Inc.

How to Secure Your Microsoft SharePoint Products
sponsored by Thawte Inc.
EGUIDE: This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order.
Posted: 22 May 2013 | Published: 22 May 2013

Thawte Inc.

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper, CSO explores why desktop virtualization should be core to your information security foundation.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix

WAN Optimization: Expert Guidelines to Management and Security
sponsored by SearchNetworking.com
EBOOK: What is the next step for WAN management? This expert guide explains why WAN optimization is now the norm and provides guidelines for an all-in-one strategy to minimize cost, complexity, and risk within your organization.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

SearchNetworking.com

Untangling Work and Personal Data with Enterprise MAM
sponsored by IBM
EBOOK: This exclusive 3-part e-book explains how and why you should use mobile app management (MAM) to control enterprise apps. Inside, discover how you can securely enable successful enterprise mobility, and get an inside look at a MAM comparison: app wrapping vs. containerization.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences