ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Veracode, Inc.

  • Strategies to Ensure Software Security

    In this webcast, you will learn the strategies to ensuring software security and reliability and how to choose a platform that won't fail down the line. Watch now to gain insider tips and guidance.

  • Secure Agile Development: Why Can't We All Get Along?

    View this webcast to learn how to weave security into development operations to bridge the gap between the two teams. Watch now to learn how to move from a waterfall to an agile strategy when developing and securing code.

  • Driving a Culture of Security Through Product Development and Delivery

    Tune into this webcast to learn about what it takes to successfully facilitate a secure application development and delivery strategy. Additionally, learn about some of the biggest barriers that prevent organizations from developing their own secure environments and much more.

  • Simplifying Security in the Agile SDLC

    How do sophisticated software development shops inject secure development into their Agile software development lifecycle? Tune into this webcasts featuring experts Maria Loughlin and Rob Curtis from application security firm Veracode, to find out.

  • Building Security into the Agile SDLC

    Tune into this webcasts to hear from Paul Roberts of the Security Ledger engage and Veracode's security and development experts Ryan O'Boyle and Pete Chestna as they share their best practices on integrating security into agile development- to rapidly deliver applications without exposing them to critical vulnerabilities.

  • Reality Checking your Security Testing Program

    How do you know if your security testing protocols are actually fully effective? This webcast demonstrates what you need to know to ensure that your security testing methods are running as they should.

  • Insider Strategies for Application Layer Security

    Join in this webcast to learn how a testing strategy can secure all of your apps and how one cloud-based service can help.

  • Evolve To Become the 2018 CISO or Face Extinction

    Unfortunately for the CISO, their career path is dissolving and is projected to dissipate by 2018. Luckily, this has also opened up 2 new roads to travel down: evolve into a more business-focused S&R leader or stay focused on IT. What should you do? Access this white paper to learn what Forrester Research has to say about the shift.

  • Top 5 Web and Mobile App Security Challenges

    Access this brief infographic to learn the top five challenges to securing web and mobile applications today. View now to explore an alternative strategy to reduce app-layer risk.

  • The Application Testing Gap

    Check out this quick infographic to see the rising cost of application security testing. Explore new ways to reduce spending while protecting all of your apps.

  • Case Study: Securing 1000+ Apps from a Centralized Dashboard

    Access this case study to learn how one banking firm centralized their strategy and automated testing to ensure consistency and reduce costs with a cloud-based security platform.

  • Secure Agile Development Guidelines

    Access this white paper to learn how to integrate security into the development process.   Read on to learn how to craft your app security strategy for an agile environment.

  • Why Application Security is a Business Imperative

    View this white paper to learn how to close application vulnerability gaps and mitigate business risk.  Read on to learn more.

  • Evolve to Become the 2018 CISO... Or risk Extinction

    The traditional role of the CISO boasts key characteristics of having technological and security insights, but based on extensive studies from Forrester Research, it has become apparent that these are not the same characteristics you can expect to see from CISOs within the next four years. Find out why by tuning into the following webinar.

  • App Security: Going Beyond Scanning and Remediation

    This white paper outlines one cloud-based app security platform that continuously monitors and assesses business-critical applications to find vulnerabilities earlier.

  • The Impact of Data Breaches: Why Application Security is a Business Imperative

    64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.

  • Webinar: Why Benchmark Application Security?

    Benchmarking application security transitions development plans from assumptions to factual reality. View this webinar to discover how a software assurance maturity model (SAMM) analysis can provide a benchmark for application security performance, and help build realistic plans for the future.

  • Webinar: When is Application Security Done?

    Traditional patchwork approaches to application security does not scale to match these leaps in company needs, resulting in poor security coverage of the application infrastructure. Listen to this webinar to discover the growing needs of modern companies, and which security practices will scale to match what tomorrow holds.

  • ROI Case Study: Cloud-Application Security Service

    A Global 2000 financial services organization previously relied on a traditional on-premises security scanning tool. View this Forrester case study now to see how this financial institution captured 192% ROI and reduced application vulnerabilities by 60% with a cloud-based security system.

  • Case Study: Global 100 Manufacturer Reduces Risk Across 30,000 Domains in Eight Days

    A Global 100 manufacturer has thousands of applications that require continuous security assessments, relying on a legacy program that strained under the volume. View this case study now to see how this manufacturer reduced vulnerabilities by 79% in 8 months, and examined 30,000 domain names and IP addresses immediately.

  • Case Study: How a Global Bank Addressed App Security and Lowered Costs

    A global leader of major banks mandated a new top-down approach to reduce application-layer risk throughout its global software infrastructure. View this case study to see how a security solution helped this bank assess their security needs and reduce the opportunity for exploitation.

  • Magic Quadrant for Application Security Testing

    Choosing the right software security testing tool can be an overwhelming process. In this Gartner report, make your decision a little easier with a comparison of the top app security testing vendors on the market, including IBM, HP, Veracode, Aspect, and more.

  • Disclosures 2012 - The Vulnerability of Publicly Traded Companies

    In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.

  • Top 10 Mobile Application Risks

    In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.

  • Understanding the risks of mobile apps

    Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.