ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • How to Automate an API Security Program

    Sponsored by: Data Theorem

    Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.

  • Application-Centric Security

    Sponsored by: Nutanix

    Relying on antiquated methods of protecting IT is no longer feasible. It's time to consider a new application-centric approach that delivers the protection you need with more agility, more flexibility, and above all, better security. Download this e-book to learn how application-centric security can benefit your organization today.

  • Avoid the Breach With Effective Application Security Testing

    Sponsored by: HackerOne

    Security is a top priority for e-commerce giant Shopify. Join Shopify's Vice President of Security Engineering and IT, Andrew Dunbar in this webcast as he discusses best practices for testing and securing your cloud-based web applications. The session will also cover how you can scale application security for high-growth DevOps organizations.

  • Meet PCI DSS Requirements

    Sponsored by: HackerOne

    Many organizations are limited by traditional penetration tests. A better approach is needed to discover real-world vulnerabilities while meeting penetration testing requirements set forth by PCI-DSS. In this webcast, learn how crowdsourced security testing addresses compliance requirements, scales security teams and keeps applications safe.

  • DevOps Security for Cloud and Containers

    Sponsored by: Lacework

    In this e-book, learn how technology differences between development, staging, and product environments can lead to much larger security problems, how microservices deployed as containers help eliminate vulnerabilities, and much more.

  • Deakin Hardens Its Shield With Ivanti

    Sponsored by: Ivanti ANZ

    Deakin University determined the ASD's recommended cybersecurity controls would help them implement the strongest defense against cyberattacks. In this case study, learn how Deakin University was able to address the Top 4 of the ASD Essential 8 strategies after implementing Ivanti's security portfolio.

  • A Security Guide to Container Orchestration

    Sponsored by: Lacework

    It's hard to argue against the benefits of containers and containerized apps running on cloud resources. However, containers create new cloud security challenges. Download this Security Guide to Container Orchestration to learn how you can stay secure in your various cloud environments today.

  • How to Simplify Security and Shrink the Attack Surface

    Sponsored by: VMware and Intel

    Modern applications are dynamic and distributed – and the attack surface keeps growing as a result. To secure your business, you need security integrated into your infrastructure, not bolted-on. Download the eBook to learn how to reduce the attack surface and simplify security.

  • Making Application Security Pay

    Sponsored by: Veracode, Inc.

    Jump into this whitepaper to learn strategies for improving the effectiveness of your application security process, from developer training, to remediation coaching, automated testing, and more.

  • Secure Coding Best Practices Handbook

    Sponsored by: Veracode, Inc.

    Access this whitepaper to learn some of the best steps you can take today to have more secure coding practices, and the many risks you'll be able to address.

  • The Total Economic Impact Of Veracode Application Security Platform

    Sponsored by: Veracode, Inc.

    Check out this ROI analysis of Veracode's application security platform to find out just how much more secure your apps could be, and how you can reduce security flaw resolution time by 90%.

  • Application Security Beyond Scanning

    Sponsored by: Veracode, Inc.

    To make application security truly effective at reducing the risk of a damaging breach, there are three critical steps beyond scanning to help develop more secure code. Explore those three critical steps in this whitepaper.

  • Secure DevOps: Fact or Fiction?

    Sponsored by: Veracode, Inc.

    It's important to build security into your DevOps process. This is easier said than done, but take a look through this DevOps security guide to uncover how to shift security left, who should be responsible for security, and how to quickly improve the quality of the applications you are developing.

  • Blue Prism Transforms Security from Reactive to Proactive with Veracode

    Sponsored by: Veracode, Inc.

    Establishing trust in your product's security is just as important as its overall quality in the eye of the user -- a fact almost all developers are familiar with. That's why many development teams are making a shift from reactive to proactive application security models. Keep reading to find out why, illustrated by a real world story.

  • The State of the CASB Market

    Sponsored by: Forcepoint

    With CASBs (Cloud Access Security Brokers), organizations can experience the benefits of innovation that cloud applications bring while maintaining control of their data. In this webcast, CEO and Osterman Research founder Mike Osterman will share the results of his survey on how organizations are using, or planning to implement, CASBs.

  • Security Automation with Ansible

    Sponsored by: Red Hat

    Configuring systems and applications to make life more difficult for attackers is daunting. In this webcast, learn how using the agentless, push-based power of Red Hat Ansible Automation to apply and enforce security standards can help organizations adapt to meet internal and external security guidelines.

  • Definitive Guide to Securing DevOps

    Sponsored by: WhiteHat Security

    Security can become a massive roadblock at the end of a development sprint, so you need to think about shifting it left in your DevOps process. What can a security shift left accomplish for you? Learn about all of the benefits in this whitepaper, and learn how to begin moving your security process today.

  • Protecting Against Threats with Updated Application Security Testing

    Sponsored by: WhiteHat Security

    In this Technology Spotlight report, IDC recommends application security testing tools that integrate security throughout the entire software development life cycle. Read on for an in-depth look at the role of WhiteHat Security in the marketplace for application security testing solutions.

  • A Guide to Achieving SaaS Security and Compliance

    Sponsored by: Forcepoint

    The nature of today's organizations is being driven by employees' demands for greater flexibility, productivity, and mobility. While SaaS applications fulfill these user demands, they also pose visibility and control challenges for IT. In this white paper, learn how SaaS applications can be effective at meeting users' needs without posing risks.

  • Cloud Access Security Broker- Market Quadrant 2018

    Sponsored by: Forcepoint

    Cloud Access Security Brokers (CASBs) serve to monitor activity and enforce security policies between cloud users and cloud applications. CASBs also give organizations visibility into authorized and non-authorized cloud applications. In this Radicati Market Quadrant, explore key CASB vendors in the market.

  • How to Navigate the Intersection of DevOps and Security

    Sponsored by: Synopsys

    Open this whitepaper on navigating the intersection of DevOps and security to learn how to include security early on in your development process and keep your deployment schedule moving smoothly.

  • Magic Quadrant for Application Security Testing

    Sponsored by: Synopsys

    In this Gartner Magic Quadrant report, discover 11 AST vendors and how they stack up. Some of these vendors include, Synopsys, Veracode, IBM, WhiteHat Security, and more. Read on to see how these vendors stack up.

  • The CISO's Ultimate Guide to Securing Applications

    Sponsored by: Synopsys

    In The CISO's Ultimate Guide to Securing Applications, discover the tools and services you need to get your application security program on track.

  • Agile Development for Application Security Managers

    Sponsored by: Synopsys

    Security is an incredibly important, though oftentimes forgotten piece of any Agile process. In this guide, find what tweaks to your Agile process you can make today to improve security and deploy your applications even faster.

  • Top 10 Application Security Vulnerabilities for Developers

    Sponsored by: WhiteHat Security

    Join Mark Rogan, DAST Manager from the WhiteHat Security Threat Research Center, as he discusses the top vulnerabilities and gives valuable prevention tips for enterprises to implement.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.