IT Management  >   Systems Design and Development  >   Application Development  >  

Security-related Design

RSS Feed   
Security-related Design Reports
 
Can You Build Securely In The Cloud?
sponsored by Horangi
RESOURCE: Most engineering teams are no strangers to building in the cloud. However, these cloud environments are huge targets for hackers, and user errors/misconfigurations are making this critical data a low hanging fruit. Read this article to discover how remote engineering teams can address these concerns and build more securely in the cloud.
Posted: 04 Feb 2021 | Published: 04 Feb 2021

Horangi

NIST Application Security Revisions You Need to Know
sponsored by Contrast Security
RESOURCE: NIST is a standard leader in the cybersecurity space that sets guidelines for organizations to follow across different areas of security. This landing page contains several useful resources focusing on the NIST revisions to their application security guidelines.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

Contrast Security

The State of DevSecOps Report
sponsored by Contrast Security
WHITE PAPER: According to the State of DevSecOps report, 79% of IT leaders admit their average application in development has an average of 20 or more vulnerabilities. Download the State of DevSecOps report here to explore which security solutions are keeping organizations safe and reliable this year.
Posted: 26 Jan 2021 | Published: 26 Jan 2021

Contrast Security

The State Of Application Security, 2020
sponsored by F5 Networks
ANALYST REPORT: Once again, applications are the leading attack vector in security breaches. The best way to protect your business from these attacks is to embrace automation in testing and remediation. Explore how in Forrester’s State of Application Security report.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

F5 Networks

How to Deliver DevSecOps
sponsored by Veracode, Inc.
EGUIDE: Developer responsibilities are changing to include security—but DevSecOps doesn't have to be a drag. In this exclusive e-Guide, find 3 articles that explore how developers can implement security practices without adding to their workloads or their stress.
Posted: 11 May 2020 | Published: 11 May 2020

Veracode, Inc.

Lack of Security Observability Thwarts Application Security
sponsored by Contrast Security
WHITE PAPER: In today’s application-centric world, real-time, actionable data about an organization’s application security posture—including information about vulnerabilities and attacks—is crucial. Learn how your organization can gain full observability and security with an integrated platform approach. Read the white paper for the details.
Posted: 21 Jan 2021 | Published: 28 Jan 2021

Contrast Security

Shifting Cloud Security Left with Infrastructure as Code
sponsored by DivvyCloud
WHITE PAPER: DevOps has forever changed the software development lifecycle for the better. But what is the role of DevOps in ensuring cloud security and compliance? This white paper highlights how addressing key challenges can be addressed by shifting cloud security left – avoiding misconfigurations and misalignments. Read on to learn more.
Posted: 22 Apr 2020 | Published: 22 Apr 2020

DivvyCloud

Achieving CloudSecOps Maturity
sponsored by DivvyCloud
WHITE PAPER: When it comes to establishing cloud security operations (CloudSecOps) methods, organizations tend to begin with in-house solutions. In this white paper, discover the limitations of in-house solutions, and realize when it’s time to look elsewhere.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

DivvyCloud

Traceable Overview CTA Demo
sponsored by Traceable
VIDEO: View this video overview of Traceable and how it uses security observability with artificial intelligence and machine learning to secure modern application architectures and their API's.
Posted: 12 Feb 2021 | Premiered: 12 Feb 2021

Traceable

How to Secure Your Microsoft SharePoint Products
sponsored by Thawte Inc.
EGUIDE: This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order.
Posted: 22 May 2013 | Published: 22 May 2013

Thawte Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info