IT Management  >   Systems Design and Development  >   Application Development  >  

Security-related Design

RSS Feed   
Security-related Design Reports
 
Application Security Evolved: How to Use Attacker-Centric Security to Fix the WAF
sponsored by ThreatX
WHITE PAPER: Download this white paper for a security team's guide to the current state of web application security.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

TOPICS: 
ThreatX

11 Security Analytics Providers Slug it Out
sponsored by LogRhythm, Inc.
WHITE PAPER: Forrester surveys indicate that 74% of global enterprise security technology decision makers rate improving security monitoring as a high or critical priority. In this Forrester report, discover an in-depth look at 11 security analytics vendors: where they excel, fall short, and how they compare to one another.
Posted: 14 Sep 2017 | Published: 06 Mar 2017

TOPICS: 
LogRhythm, Inc.

Strategies for Improving Enterprise Application Security
sponsored by WhiteSource
WEBCAST: While most enterprises are focused on application scanning and remediation, many software development experts are advocating better, more secure application development initiatives that prevent vulnerabilities from occurring in the first place. In this webcast, experts discuss steps to integrate security into the app development process.
Posted: 15 Jan 2019 | Premiered: Mar 13, 2018

TOPICS: 
WhiteSource

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
Posted: 01 Aug 2018 | Published: 02 Feb 2018

TOPICS: 
Veracode, Inc.

Enforcing Immutability & Least Privilege to Secure Containerized Applications on Openshift
sponsored by Aqua Security
WEBCAST: In this webinar, learn more on how you can secure your containers with an approach that enforces immutability and least privilege.
Posted: 18 Jan 2019 | Premiered: Jan 16, 2019

TOPICS: 
Aqua Security

Securing Web Applications in Container-Based Environments
sponsored by Fortinet, Inc.
WHITE PAPER: A lack of dynamic security capabilities that can keep pace with the ever-changing nature of DevOps environments leaves organizations exposed to risks. In this white paper, learn about Fortinet's WAF that is designed to protect web-based applications and internet-facing data from threats within container-based environments.
Posted: 14 Feb 2019 | Published: 17 Nov 2018

TOPICS: 
Fortinet, Inc.

E-Book: Technical Guide on Application Security: Secure Development
sponsored by IBM
EBOOK: When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

TOPICS: 
IBM

Presentation Transcript: Path to a Secure Application
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

TOPICS: 
IBM

Empower your Developers
sponsored by Coverity by Synopsys
WHITE PAPER: The repercussions of releasing unsecure software in today’s markets are severe – due in large part to the proliferation of constantly-connected, mobile devices. This white paper provides an overview of these challenges, and demonstrates the steps you can take to arm your developers against the risks of modern application development.
Posted: 16 May 2011 | Published: 16 May 2011

TOPICS: 
Coverity by Synopsys

State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

TOPICS: 
Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement