ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • Toughening up web and mobile application security

    Sponsored by: ComputerWeekly.com

    In this e-guide, read more about the best practices for web application security, how to balance app innovation with app security, why API security needs to be part of your defence strategy, and what are the top tools to keep your applications safe, among other trends.

  • A guide to developing modern mobile applications

    Sponsored by: ComputerWeekly.com

    A key ingredient of eBusiness is the ability to offer customers the very best user experience, irrespective of whether they use a web browser, a mobile browser or a mobile app. In this guide, we explore the challenges organisations face in managing the numerous ways customers can transact with businesses.

  • Infographic: 5 cybersecurity predictions for 2022

    Sponsored by: ComputerWeekly.com

    Cybercrime showed no sign of slowing down in 2021 and enterprises continue to fall victim to cyberattacks, with gangs targeting larger organizations with increasingly large demands. In good news, we can always take stock of the recent past and know what to prepare for. In this infographic, we point out five forecasts for cybersecurity in 2022.

  • Everything You Need to Know About the Log4j Vulnerability

    Sponsored by: TechTarget

    Here, dig into the origins of the Log4J vulnerability, the severity, and what needs to change to ensure enterprise systems aren't at risk in the future.

  • Effective application security requires holistic, quick, and continuous protection

    Sponsored by: Cloudflare

    Although critical to most modern businesses, applications expose organizations to significant security threats. In fact, the National Vulnerability Database reported over 18,000 application vulnerabilities in 2020 – a new record. Download this white paper to learn more about protection your applications against today’s threat landscape.

  • Creating A Safe Environment For Under-Protected Apis

    Sponsored by: Radware

    Learn how to create a safe environment for your under protected APIs and protect against the most common API attacks with Radware.

  • Webinar: Connect FinTech to Core Banking Data

    Sponsored by: AWS & Trustgrid

    Cloud-based applications have become the standard for new FinTech architectures. However, this presents some unique challenges for data access, security, and integration. This webinar discusses how FinTech applications providers are reimagining the way they access and secure core banking data with data mesh – watch now to get started.

  • Evaluating and Selecting AppSec Vendors to Fit Your Business Needs

    Sponsored by: Veracode, Inc.

    The application security (AppSec) market is oversaturated with an abundance of options, which can make finding an AppSec vendor/offering best fit for your unique needs a difficult task. Read this infosheet for some expert guidance to help get you started on your AppSec journey.

  • SAST vs. DAST: What Are the Differencesand Why Are They Both Important?

    Sponsored by: Veracode, Inc.

    If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.

  • AppSec Stats Flash Podcast: Applying the 80/20 Rule for Web, API and mobile AppSec

    Sponsored by: WhiteHat Security

    The application threat landscape is rapidly evolving – this means a more frequent analysis of application security policies. What steps can be taken to make apps more secure? Watch this webcast featuring a panel of industry experts as they provide key data points and trends and discuss what can be done to improve application security.

  • Understanding Your Open Source Risk

    Sponsored by: Veracode, Inc.

    Developers are being asked to push out more software — and in shorter periods of time — than ever before. This has led to an increased reliance on open source libraries, and as this code is reused, it comes with a high risk of vulnerability. Access this e-book to learn more about the risks of open source and the challenges in securing it.

  • Get the Most Mileage Out of Your AppSec Program

    Sponsored by: WhiteHat Security

    While formulating your race strategy to stay secure in 2021 and beyond, your security and development teams must be running at optimal performance to ensure vulnerabilities are identified and remediated. Join this webinar to learn how you can take your application risk management to the next level.

  • Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS

    Sponsored by: ComputerWeekly.com

    In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.

  • Using digital twins to cut costs and improve safety at Shell

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.

  • The Advantages of a SaaS-Based Application Security Solution

    Sponsored by: Veracode, Inc.

    In this infographic, discover 7 advantages of a SaaS-based application security program vs. on-premises.

  • How Do Vulnerabilities Get Into Software?

    Sponsored by: Veracode, Inc.

    Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.

  • Application Security Stats Flash

    Sponsored by: WhiteHat Security

    API-based applications are more at risk than ever before. As such, there is a critical need for a frequent and periodic analysis of the state of application security. Use this report, AppSec Stats Flash by WhiteHat security, to explore biggest windows of exposure by industry, the most prominent security vulnerabilities and average time-to-fix.

  • Bridge your Executive Team

    Sponsored by: WhiteHat Security

    Application security is becoming increasingly important as applications play a more prominent role in driving today’s economy. Watch this webinar to learn more about the current state of AppSec, the challenges security teams are facing and how to get executive buy-in for AppSec initiatives.

  • Are Your Apps in the Race to Win?

    Sponsored by: WhiteHat Security

    For modern organizations, applications play a prominent role in both internal operations and interacting with end-users. As a result, application security has become critical. Watch this webinar to learn more about AppSec and why it’s critical for digital transformation initiatives.

  • Whitehat Security Webinar

    Sponsored by: WhiteHat Security

    Dynamic Application Security Testing (DAST) enables AppSec teams with the ability to assess and address the actual risk of their applications – providing critical security capabilities to support DevSecOps initiatives. Watch this webinar to learn more about DAST and how it can support your AppSec goals.

  • The State of Application Security

    Sponsored by: WhiteHat Security

    Attackers continue to take advantage of application flaws to compromise organizations and put their customers at risk. This means that as much as Dev teams prioritize faster release cycles, it’s important that they don’t overlook security. In this WhiteHat webinar, examine the state of application security and what you can do to stay protected.

  • Enable and Educate Your Team

    Sponsored by: WhiteHat Security

    Too many cyberattacks come from subpar employee enablement and/or security misconfigurations. WhiteHat is looking to resolve this issue with their eLearning Platform, designed to educate your users on common application security threats, best practices, incident remediation, and more – read on to learn more about the platform.

  • Does your AppSec Program Gen An A+?

    Sponsored by: WhiteHat Security

    Applications are critical to an organization’s ability to communicate internally as well as with end-users or other third parties. As a result, apps are a quickly becoming a prime target for cybercriminals. Watch this webinar to learn more about the AppSec landscape, including what the common threats are and where pressure is rising.

  • Security in the Fast Lane

    Sponsored by: WhiteHat Security

    Today’s organizations rely on a collection of applications in order to maintain internal operations and interact with end-users. However, dangerous threats targeting data in these critical apps have emerged. Watch this webinar to learn more about the application security threat landscape, notable breaches and how to protect your apps.

  • Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.