ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Contrast Security

  • NIST Application Security Revisions You Need to Know

    NIST is a standard leader in the cybersecurity space that sets guidelines for organizations to follow across different areas of security. This landing page contains several useful resources focusing on the NIST revisions to their application security guidelines.

  • Continuous Application Security: A Unified Approach Across the SDLC

    This webinar makes the case for instrumentation-based unified application security. With IAST and RASP, the security strategy can detect vulnerabilities, prevent exploits, secure data, and maintain compliance. Watch the webinar now to find out more.

  • Security Instrumentation is the Future of All Software

    We’re in a software security crisis—and we have been for a while now. In both 2000 and 2019, applications had an average of 26.7 serious vulnerabilities. This webinar examines the state of application security and considers how strong instrumentation-based application security platforms are key to finally uniting development and security.

  • Securing APIs at DevOps Speed

    When APIs are insecure, we still have something to work with—and the sooner we’re aware of the security threats, the better. In this webinar, learn about the different approaches to API security and how API security can fit into DevOps methodologies for the best results. Watch the webinar here.

  • AppSec Guide: Complying with New NIST SP 800-53 IAST & RASP Requirements

    The newly released AppSec requirements from the National Institute of Standards and Technology (NIST) outline the need to address specific software vulnerabilities in response to the increasing volume of automated attacks. This whitepaper highlights what to expect with the new requirements and provides 4 key steps for ensuring compliance.

  • Using Security Instrumentation to Analyze and Protect Software

    Instrumentation-based application testing can help improve security without skilled security staff or the need to change code. It can also help developers push code into production much faster than formal processes for testing and approval. Dive into this white paper to learn more about the advantages of using instrumentation to automate AppSec.

  • Contrast Assess Route Intelligence

    Learn how Contrast Assess Route Intelligence transforms AppSec by observing the routes of an application while it’s running—thereby exposing all the different points of entry into the application.

  • Perimeter Security Noise Leaves Applications Vulnerable to Attacks

    Learn how you can get AppSec protection that can compensate with the necessary visibility, accuracy, scalability, and ease of deployment to keep pace with modern application vulnerabilities without generating false positives and false negatives.

  • A Comprehensive Approach to DevSecOps

    More than half of organizations in a recent study say that their security team has reached a tipping point where the number of security tools in place has adversely impacted their security posture and increased risk. Stuck in the AppSec tool swamp? Learn about a unified AppSec platform that can alleviate this problem.

  • The Continuous Application Security Handbook

    With widespread enterprise reliance on automated software and applications, security has become a concern that haunts just about every tech-driven business. Download this handbook for a look into continuous application security, and how to establish the three key layers of security within your own applications.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.