IT Management  >   Systems Design and Development  >   Application Development  >  

Security-related Design

RSS Feed   
Security-related Design Reports
 
Static Analysis and the Truth About False Positives
sponsored by WhiteHat Security
PRODUCT OVERVIEW: Learn the truth behind false positives and how a source code scanning technology that is not programmed with assumptions can help your application security program today.
Posted: 04 Mar 2019 | Published: 04 Mar 2019

WhiteHat Security

The AI and Human Element Security Sentiment Study
sponsored by WhiteHat Security
RESEARCH CONTENT: 60% of organizations have more faith in human-verified cyberthreat findings over AI-verified ones. In this security report, researchers examine the RSA Conference 2020 survey results to uncover growing trends in the industry. Gain insight into industry trends. Download the report here.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

WhiteHat Security

The State of Web Application Security
sponsored by Radware
RESEARCH CONTENT: Download The State of Web Application Security for a summary of current perceptions about the state of application attacks, security practices and the impact of the transition to microservice architectures.
Posted: 28 Feb 2020 | Published: 28 Feb 2020

Radware

Sentinel Auto API
sponsored by WhiteHat Security
DATA SHEET: Traditional API testing is manual, time-consuming, and widely unpopular. In fact, less than 25% of organizations are testing their APIs. However, the critical nature of APIs requires them to be protected. In this data sheet, take a closer look at the key features of Sentinel Auto API and see if it meets for your API security needs.
Posted: 16 Apr 2020 | Published: 16 Apr 2020

WhiteHat Security

Six Steps to Comprehensive Container Security in AWS
sponsored by Trend Micro
WHITE PAPER: Containers grant developers the power to create and deliver applications faster and more consistently. But, as with any technology, there’s a catch. Containers can also increase infrastructure complexity, which in turn leads to overlooked security gaps. In this guide, find 6 steps you can take toward comprehensive container security in AWS.
Posted: 16 Jun 2020 | Published: 16 Jun 2020

Trend Micro

WhiteHat Security 2020 Predictions
sponsored by WhiteHat Security
WHITE PAPER: In 2019, there were 15.1 billion breached records total. 12,174 new vulnerabilities were found in commercial and open source software. Will 2020 have the same numbers? In this report, learn about the state of application security, from the new Chief Application Security Officers to shifts in data privacy and IT security training.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

WhiteHat Security

Best Practices for Effective Remote Working
sponsored by Orange Business Services
EBOOK: Gartner reports that 41% of employees are likely to work remotely at least some of the time post-coronavirus. This means that organizations are going to have to make their remote strategies work for the long-term as well as the short. Browse this e-book for tips on collaboration and ways to effectively deploy remote access technology.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Orange Business Services

Application Encryption and Security
sponsored by NetLib Security
WHITE PAPER: Adequate application security is defined by protection against external threats alongside the ability to detect and prevent internal vulnerabilities. While this may sound simple, the average organization has around 50% of apps that remain vulnerable. So, what is the solution to this problem? Read on to find out.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

NetLib Security

Best Practices for Successful Transformation Journey with Automation
sponsored by Red Hat
VIDEO: In this round table discussion, join leaders at Andorra Telecom, Rabobank and Discovery as they share best practices and success stories regarding their digital transformation and journey towards automation.
Posted: 24 Jul 2020 | Premiered: 05 Jun 2020

Red Hat

Mobile Security Solutions: Securing & Leveraging Mobile Devices
sponsored by Entrust, Inc.
WHITE PAPER: This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.
Posted: 23 Jul 2012 | Published: 23 Jul 2012

Entrust, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info