IT Management  >   Systems Operations  >   Security  >  

Software Security

RSS Feed   
Software Security Reports
 
How to Automate API Security
sponsored by Data Theorem
WHITE PAPER: As software goes into production on a weekly, daily, and hourly basis, teams need to know if any APIs are vulnerable and be alerted to any changes in how it is being used. In this white paper, discover the benefits of automated API security, the problems with securing modern APIs, and more.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

Data Theorem

Micro-services: Patterns and Nimbleness
sponsored by Crowd Machine
RESOURCE: How can your organization take advantage of the agility, scalability, and flexibility that micro-services offer? View this blog post to find out.
Posted: 14 Aug 2019 | Published: 02 Apr 2019

Crowd Machine

How to Automate an API Security Program
sponsored by Data Theorem
WEBCAST: Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.
Posted: 10 Jun 2019 | Premiered: Jun 10, 2019

Data Theorem

A Guide to Joining DevOps and Security
sponsored by Trend Micro, Inc.
EGUIDE: If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
Posted: 09 May 2019 | Published: 03 May 2019

Trend Micro, Inc.

Avoid the Breach With Effective Application Security Testing
sponsored by HackerOne
WEBCAST: Security is a top priority for e-commerce giant Shopify. Join Shopify's Vice President of Security Engineering and IT, Andrew Dunbar in this webcast as he discusses best practices for testing and securing your cloud-based web applications. The session will also cover how you can scale application security for high-growth DevOps organizations.
Posted: 04 Jun 2019 | Premiered: Jun 4, 2019

HackerOne

6 Steps to Comprehensive Container Security in AWS
sponsored by Amazon Web Services
WHITE PAPER: Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.
Posted: 04 Sep 2019 | Published: 31 Jul 2019

Amazon Web Services

The Role of Kubernetes in Cloud Security
sponsored by Lacework
WHITE PAPER: Adoption of Kubernetes has skyrocketed in the last few years, but knowledge of the platform is still lacking. Download this white paper to learn about the role of Kubernetes in cloud security and how the landscape of security and DevOps is rapidly changing.
Posted: 07 Aug 2019 | Published: 07 Aug 2019

Lacework

DevOps Security for Cloud and Containers
sponsored by Lacework
EBOOK: In this e-book, learn how technology differences between development, staging, and product environments can lead to much larger security problems, how microservices deployed as containers help eliminate vulnerabilities, and much more.
Posted: 30 May 2019 | Published: 30 May 2019

Lacework

How to Automate Mobile AppSec without the Staff
sponsored by Data Theorem
WEBCAST: The demand for mobile apps has caused a need for developers to improve and release features at an unprecedented rate to stay ahead of the competition—the hard part is making sure security doesn't fall through the cracks. Watch this webinar to learn top challenges and problems facing security teams for mobile AppSec and how you can remedy them.
Posted: 11 Apr 2019 | Premiered: Apr 11, 2019

Data Theorem

Securing Your Open Source Software Applications
sponsored by Contrast Security
WHITE PAPER: Open source brings accelerated development lifecycles and faster time to market, but it leaves application vulnerable making them a prime target for cyber threats. Read this whitepaper, which explores the benefits of open source security solutions that can make your development team's work more effective in its final state.
Posted: 25 Jul 2019 | Published: 25 Jul 2019

Contrast Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement