Research Library

Powered by

All Research Sponsored By:WhiteHat Security


    Digital transformation in this new era has increased security risks and widened the threat landscape for the most companies across the globe. Open the case study to learn how one of the world’s largest fast-food chains secures business-critical applications with WhiteHat Security.

  • Beers on Breaches: 6-Pack Roundup

    Access this blog to learn about companies like McDonalds, Wegman’s, and more that have victimized by data breaches so you can stay ahead of the hits.

  • Crash Course Series Webinar - XSS Part1

    Cross-Site Scripting (XSS) is one of the most prevalent vulnerabilities on the web today and can also be one of the most dangerous and damaging attacks as well. Watch the webinar to explore XSS in all its glory.

  • Follow Up: National Cybersecurity Executive Order

    With the recent Executive Order (EO), the promise for remediating cybersecurity vulnerabilities have posed more serious and lasting threats has surfaced. Access this blog to look at the timeline between the signed EO and initiatives for improving the infrastructure of national cybersecurity to date.

  • Don’t Let These Five Myths Hinder Your DevSecOps Adoption

    Everyone is talking about DevSecOps, but very few organizations have mastered it. Explore the 5 myths that can hinder your DevSecOps adoption—and how to debunk them—right here.

  • Making It All Work: A Practical Guide to Operationalizing the Modern AppSec Framework

    The Modern AppSec Framework delivers a functional plan with which organizations can use to develop and deliver secure applications, regardless of where they are in their security or application development journey. Download the practical guide to operationalizing the modern AppSec framework here.

  • Top 5 Ways to Be Cyber Smart

    October is Cybersecurity Awareness Month, and to help kick it off in style, NTT Application Security is here with a rundown of 5 of the top AppSec actions you and your organization can take right now to get cyber smart and strengthen your security posture as we finish 2021 strong and dive boldly into 2022.

  • DAST TO THE FUTURE: Shifting the Modern Application Security Paradigm

    If the goal of application security testing is a digital future that is free from breaches, a DAST-forward approach is a must. Read on to learn how a modern paradigm can take your application security DAST to the future.

  • AppSec Stats Flash Podcast: Applying the 80/20 Rule for Web, API and mobile AppSec

    The application threat landscape is rapidly evolving – this means a more frequent analysis of application security policies. What steps can be taken to make apps more secure? Watch this webcast featuring a panel of industry experts as they provide key data points and trends and discuss what can be done to improve application security.

  • Get the Most Mileage Out of Your AppSec Program

    While formulating your race strategy to stay secure in 2021 and beyond, your security and development teams must be running at optimal performance to ensure vulnerabilities are identified and remediated. Join this webinar to learn how you can take your application risk management to the next level.

  • AppSec Stats Flash: Applying the 80/20 Rule for Web, API and Mobile AppSec

    In this month’s issue of the AppSec Stats Flash report, take a closer look at the threat landscape surrounding web, mobile and API-based application security to uncover key metrics related to top vulnerabilities and best practices for addressing them – such as leveraging the OWASP Top-10. Read on to unlock the full report.


    Whether your team is creating its first AppSec program or searching for expert program management to move security left, WhiteHat Security’s AppSec Performance Package might be able to help. Save this data sheet to see how WhiteHat can help your team identify program risks and secure more applications in less time, with less in-house resources.

  • AppSec Stats Flash Podcast

    In this episode of the AppSec Stats Flash podcast, join Setu Kulkarni, VP of Corporate Strategy and Business Development and Zach Jones, Sr. Director Security Research, as they dive into the first 3 key metrics of application security and explore the topic of shared responsibility for security. Listen here.

  • Application Security Stats Flash

    API-based applications are more at risk than ever before. As such, there is a critical need for a frequent and periodic analysis of the state of application security. Use this report, AppSec Stats Flash by WhiteHat security, to explore biggest windows of exposure by industry, the most prominent security vulnerabilities and average time-to-fix.

  • Bridge your Executive Team

    Application security is becoming increasingly important as applications play a more prominent role in driving today’s economy. Watch this webinar to learn more about the current state of AppSec, the challenges security teams are facing and how to get executive buy-in for AppSec initiatives.

  • Women Building Careers in Cybersecurity

    According to a recent study, women make up nearly half of the adult workforce in the US yet hold only a quarter of technology positions – a number that dwindles as you move up the leadership ladder. Watch this webinar and join a panel of women leaders in the tech industry as they discuss their experiences, challenges and accomplishments.

  • Application Evolution

    In this video, learn how the nature of IT security is changing and what that means for the roles and expertise required inside your organization, so you can successfully secure your applications – and your future.

  • Are Your Apps in the Race to Win?

    For modern organizations, applications play a prominent role in both internal operations and interacting with end-users. As a result, application security has become critical. Watch this webinar to learn more about AppSec and why it’s critical for digital transformation initiatives.

  • Whitehat Security Webinar

    Dynamic Application Security Testing (DAST) enables AppSec teams with the ability to assess and address the actual risk of their applications – providing critical security capabilities to support DevSecOps initiatives. Watch this webinar to learn more about DAST and how it can support your AppSec goals.

  • The State of Application Security

    Attackers continue to take advantage of application flaws to compromise organizations and put their customers at risk. This means that as much as Dev teams prioritize faster release cycles, it’s important that they don’t overlook security. In this WhiteHat webinar, examine the state of application security and what you can do to stay protected.

  • Enable and Educate Your Team

    Too many cyberattacks come from subpar employee enablement and/or security misconfigurations. WhiteHat is looking to resolve this issue with their eLearning Platform, designed to educate your users on common application security threats, best practices, incident remediation, and more – read on to learn more about the platform.

  • Does your AppSec Program Gen An A+?

    Applications are critical to an organization’s ability to communicate internally as well as with end-users or other third parties. As a result, apps are a quickly becoming a prime target for cybercriminals. Watch this webinar to learn more about the AppSec landscape, including what the common threats are and where pressure is rising.

  • Security in the Fast Lane

    Today’s organizations rely on a collection of applications in order to maintain internal operations and interact with end-users. However, dangerous threats targeting data in these critical apps have emerged. Watch this webinar to learn more about the application security threat landscape, notable breaches and how to protect your apps.

  • Cybersecurity: It's a Team Sport

    During the pandemic, cybercrime has quadrupled, leaving many organizations scrambling to strengthen their security posture. In this webinar, learn why it’s more important than ever for vendors, partners and customers to work together and build a true cybersecurity team to combat the evolving threat landscape.

  • How a Northeastern State Strengthened Application Security for their Voter Registration System

    Elections are very heavily targeted by threat actors. Troublemakers as they are, these actors will go to great lengths to breach voter privacy, even by accessing user information to impersonate voters. One state recognized this and wanted to ensure the security of their voter registration apps. See this case study to learn how they did it.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences