ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • Micro-services: Patterns and Nimbleness

    Sponsored by: Crowd Machine

    How can your organization take advantage of the agility, scalability, and flexibility that micro-services offer? View this blog post to find out.

  • No-code Platforms Bridge the LOB-IT Gap

    Sponsored by: Crowd Machine

    View the following blog post to learn how no-code platforms can close the IT-LOB gap, as well as fulfill both internal and LOB app development requirements.

  • AI and Its Role in Software Development

    Sponsored by: Crowd Machine

    Read the following blog post to examine AI's capabilities, how AI could benefit your enterprise, and AI's future role in software development.

  • Debunking No-code and Low-code Adoption Myths

    Sponsored by: Crowd Machine

    The following post will set the record straight and debunk the three most common myths about no-code and low-code platforms. Read it here to separate fact from fiction and to get an objective take on what these platforms are capable of.

  • Safeguarding PeopleSoft Against Direct Deposit Theft

    Sponsored by: Appsian

    In this white paper, explore security challenges associated with handling payroll diversion in PeopleSoft. Also, learn how user awareness, contextual access controls, and fine-grained data security can help organizations mitigate payroll diversion.

  • Exposing PeopleSoft Self-Service Applications to the Internet

    Sponsored by: Appsian

    Despite the benefits of opening applications like PeopleSoft for remote access, security ramifications are a major concern. So how do organizations maintain secure when access to PeopleSoft is available outside a secure corporate network? In this white paper, learn how you can achieve a secure remote access environment for PeopleSoft.

  • Top Research For CIOs: Security

    Sponsored by: MASERGY

    Security no longer lives exclusively in the IT department. In this Forrest report, CIOs can gain insight into the trends and key issues in the security landscape. Also, explore opportunities for improving how security is managed regardless of whether you own the security function.

  • The Role of Kubernetes in Cloud Security

    Sponsored by: Lacework

    Adoption of Kubernetes has skyrocketed in the last few years, but knowledge of the platform is still lacking. Download this white paper to learn about the role of Kubernetes in cloud security and how the landscape of security and DevOps is rapidly changing.

  • Expanding the Enterprise Perimeter with Zero-Trust Security for the Workforce

    Sponsored by: Ignition Technology Ltd

    To ease the transition from a traditional perimeter and to embrace an evolving workforce, organizations are deploying the building blocks of a zero-trust security framework. In this 2019 Duo Trust Access Report, explore key findings about zero trust and how Duo's customers are adopting different principles.

  • The Difference Between Format-Preserving Encryption and Tokenization

    Sponsored by: comForte AG

    Format-preserving encryption (FPE) and tokenization have similar objectives, but the difference between the 2 can be confusing at times. Download this resource for a brief overview of both the similarities and differences between these 2 data-centric security methods. Also, explore examples of when 1 method might be used instead of the other.

  • Automated Security at the Speed of DevOps

    Sponsored by: Trend Micro, Inc.

    As organizations implement DevOps on AWS, they need to understand the security implications. In this white paper, explore the main challenges businesses face at the intersection of DevOps and security. Also, learn best practices for integrating security within your development process from the start.

  • The 4 Types of Threat Detection

    Sponsored by: Dragos

    Threat detection comprises 1 of the 3 core cybersecurity functions along with prevention and response. But, detection plays an outsized role as arguably the most important cybersecurity function in an "assume breach" world. In this white paper, explore the 4 types of threat detection, how they are derived and the uses for each.

  • 6 Steps to Container Security

    Sponsored by: Trend Micro, Inc.

    Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.

  • The Continuous Application Security Handbook

    Sponsored by: Contrast Security

    With widespread enterprise reliance on automated software and applications, security has become a concern that haunts just about every tech-driven business. Download this handbook for a look into continuous application security, and how to establish the three key layers of security within your own applications.

  • Application Security Testing Coverage

    Sponsored by: Contrast Security

    Application security coverage is evermore important due to widespread cyber threats, but traditional frameworks fail to appropriately cover all four app security dimensions. Download this whitepaper for a side-by-side comparison of a traditional SAST solution versus Contrast Assess.

  • Digital Transformation, Devops, and Security

    Sponsored by: Contrast Security

    Customer demands have driven the digital transformation era, forcing businesses to adapt with new software that become exposed security targets. Review this whitepaper to explore how by having a security strategy in place, businesses can sustain digital transformations in an effort to meet customer needs.

  • Securing Your Open Source Software Applications

    Sponsored by: Contrast Security

    Open source brings accelerated development lifecycles and faster time to market, but it leaves application vulnerable making them a prime target for cyber threats. Read this whitepaper, which explores the benefits of open source security solutions that can make your development team's work more effective in its final state.

  • The Vulnerability Epidemic in Mobile Financial Apps

    Sponsored by: Arxan

    A recent study examined the protective capabilities of more than 30 different financial services applications found on the Google Play store. In this webinar, Knight and Arxan chief scientist Aaron Lint discuss the report findings and share best practices to enhance mobile app protection.

  • The Future of PKI in the Modern Enterprise

    Sponsored by: Sectigo

    In this webinar, join experts Tim Callan and Jason Soroko to discover how Sectigo Private CA allows you to secure and automate the management of your internal devices and applications, and save you costs, time and resources in the long run.

  • Mastering Coverage

    Sponsored by: Contrast Security

    When it comes to application security testing, "coverage" is the third rail – a controversial topic for vendors and a seemingly intractable problem for practitioners – but it is the most critical part of your application security strategy. In this white paper, explore a framework for evaluating your application security testing coverage.

  • Introduction to IAST

    Sponsored by: Contrast Security

    Interactive Application Security Testing (IAST) is a technology for automatically identifying and diagnosing software vulnerabilities in applications and APIs. IAST continuously monitors your applications for vulnerabilities from within. In this white paper, learn everything you need to know about IAST.

  • In Plain Sight: The Vulnerability Epidemic in Financial Mobile Apps

    Sponsored by: Arxan

    This study examines the perceived security of financial mobile apps. It highlights the systemic problem across the financial services industry of FIs' failure to properly secure their mobile apps. In this research report, explore key takeaways from the study which can be used as a guide to help you secure your mobile applications.

  • Securing Mobile Apps for Connected Cars

    Sponsored by: Arxan

    In this white paper, learn how Arxan Application Protection hardens connected car apps to help prevent reverse engineering attacks, secure data and encryption keys, and alert you in real-time about the security status of all your deployed apps.

  • Market Guide for In-App Protection

    Sponsored by: Arxan

    In this Gartner Market Guide, discover a market analysis on in-app protection, key findings and recommendations for security and risk managers, as well as vendors in the space.

  • The DevOps-Ready Security Program

    Sponsored by: Contrast Security

    Extending DevOps to your software application security team shifts security from being a bottleneck to an enabler. Successful security teams take a risk-based approach to enable product development without being a blocker or being left behind. In this white paper, explore 6 tips for an executive to bring security into the DevOps era.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.