ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Veracode, Inc.

  • Application Development Security Requires Forethought

    Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.

  • Resolve Web Security Issues with Industry Experts' Advice

    Learn how to bridge the communication divide between app developers and security pros, as well as foster secure coding practices in your enterprise to mitigate the vulnerabilities in your web applications.

  • The Impact of Data Breaches: Why Application Security is a Business Imperative

    64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.

  • Webinar: Why Benchmark Application Security?

    Benchmarking application security transitions development plans from assumptions to factual reality. View this webinar to discover how a software assurance maturity model (SAMM) analysis can provide a benchmark for application security performance, and help build realistic plans for the future.

  • Webinar: When is Application Security Done?

    Traditional patchwork approaches to application security does not scale to match these leaps in company needs, resulting in poor security coverage of the application infrastructure. Listen to this webinar to discover the growing needs of modern companies, and which security practices will scale to match what tomorrow holds.

  • ROI Case Study: Cloud-Application Security Service

    A Global 2000 financial services organization previously relied on a traditional on-premises security scanning tool. View this Forrester case study now to see how this financial institution captured 192% ROI and reduced application vulnerabilities by 60% with a cloud-based security system.

  • Case Study: Global 100 Manufacturer Reduces Risk Across 30,000 Domains in Eight Days

    A Global 100 manufacturer has thousands of applications that require continuous security assessments, relying on a legacy program that strained under the volume. View this case study now to see how this manufacturer reduced vulnerabilities by 79% in 8 months, and examined 30,000 domain names and IP addresses immediately.

  • Case Study: How a Global Bank Addressed App Security and Lowered Costs

    A global leader of major banks mandated a new top-down approach to reduce application-layer risk throughout its global software infrastructure. View this case study to see how a security solution helped this bank assess their security needs and reduce the opportunity for exploitation.

  • Magic Quadrant for Application Security Testing

    Choosing the right software security testing tool can be an overwhelming process. In this Gartner report, make your decision a little easier with a comparison of the top app security testing vendors on the market, including IBM, HP, Veracode, Aspect, and more.

  • Expert guide to understanding SaaS and cloud computing issues

    This expert E-Guide discusses what is involved with a SaaS transition and how you can prepare. Uncover top considerations, potential cloud computing issues and how you can tackle them.

  • State of Software Security Report Volume 4

    Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.

  • Musings on the PSN Attack Vector

    Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.

  • Magic Quadrant for Static Application Security Testing

    In this research, we analyze the evolution of the static application security testing market, and evaluate its vendors according to their business and technology vision, as well as their ability to execute against that vision in their products and services.

  • Basic Building Blocks: Preparing for PCI DSS 2.0

    With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.