Application Security Research
-
Is it time for a DLP system in your enterprise?
Sponsored by: TechTarget SecurityData loss prevention technology is a mature security control whose role is growing as DLP systems are made to respond to mobile and cloud technology in the enterprise.
-
Protect Your Web Applications from the OWASP Top 10
Sponsored by: IBMApplications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
-
Untangling Work and Personal Data with Enterprise MAM
Sponsored by: IBMThis exclusive 3-part e-book explains how and why you should use mobile app management (MAM) to control enterprise apps. Inside, discover how you can securely enable successful enterprise mobility, and get an inside look at a MAM comparison: app wrapping vs. containerization.
-
The Merry-Go-Round of Security Testing
Sponsored by: TechTarget SecurityIn this Insider Edition of Information Security, InfoSec pros will learn about the pros and cons of RASP, the runtime application self-protection method for secure software delivery.
-
Be a Web App Security Superhero
Sponsored by: TechTarget SecurityTo secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.
-
Mobilizing Enterprise Apps Depends on Management Strategy
Sponsored by: TechTarget Mobile ComputingThis expert guide explains why staying ahead of mobile governance, mobile device management (MDM), and mobile application management (MAM) is critical for providing high-quality apps and increased productivity.
-
The Finer Points of Embedded Software and IoT
Sponsored by: TechTarget App ArchitectureThis expert e-guide provides 3 articles on embedded software and Internet of Things (IoT) strategies. Discover critical advice that can help you securely develop and manage embedded software in the cloud age, implement an IoT security strategy, and conquer the application integration challenges posed by IoT.
-
Application Security in the Age of Cloud, BYOD, and SaaS
Sponsored by: BitGlassThis white paper considers the features and benefits of one application security system that promises to deliver when it comes to securing an ambiguous infrastructure. Read on to see what you can do to wrangle in BYOD, SaaS, and cloud security protocols.
-
Cloud Security: Enterprise Point of View
Sponsored by: Dimension DataAccess this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
-
Why Mobile Needs A Four-Tier Engagement Platform
Sponsored by: KonyAccess this in-depth Forrester research report to discover why mobile needs a four-tier engagement platform. Read on to discover the 4 steps to take toward the four-tier engagement architecture.
-
API and API Infrastructure Security for the CSO
Sponsored by: ApigeeSecurity must be built into the APIs themselves. But that's not enough. Threat protection, identity services, infrastructure security, and compliance also must be top of mind. This eBook provides a framework to help CSOs and CISOs consider API security.
-
What to Look for in Web Application Firewall Products
Sponsored by: TechTarget SecurityIn this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
-
Overcoming the Challenges of Internal API Programs
Sponsored by: Intel® ServicesModernizing legacy applications can be handled gracefully when the right API system is considered from the very beginning. View this webcast now to find out how to overcome cultural obstacles in implementing an internal API program, and how to present the value of having such a program.
-
Putting Security on Auto-Pilot: What Works, What Doesn't
Sponsored by: TechTarget SecurityThis technical guide examines the pros, cons, and unknowns of automated penetration testing, from how best to use one to the components of your security system that will still require human intervention.
-
What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
Sponsored by: IBMMobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
-
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
Sponsored by: IBMFind out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
-
Protecting Your Critical Data with Integrated Security Intelligence
Sponsored by: IBMAccess this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
-
Security Intelligence Is the Smart Way to Keep the Cloud Safe
Sponsored by: IBMFind out how an integrated IBM suite of intelligence solutions consolidates and analyzes data from across the cloud to provide organizations with visibility and control, to help better secure cloud environments.
-
Five Critical Steps to Achieving an Effective Application Security Program
Sponsored by: IBMDiscover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
-
Information Security Magazine: September 2014
Sponsored by: TechTarget SecurityOpen source software vulnerabilities have security executives worried. Lower your risk by revisiting application security policy and enforcing development best practices.
-
Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale
Sponsored by: Hewlett-Packard EnterpriseAccess this informative white paper to discover suggestions for a number of initiatives related to enterprise mobility, including mobility management and application access.
-
The Impact of Data Breaches: Why Application Security is a Business Imperative
Sponsored by: Veracode, Inc.64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.
-
Webinar: Why Benchmark Application Security?
Sponsored by: Veracode, Inc.Benchmarking application security transitions development plans from assumptions to factual reality. View this webinar to discover how a software assurance maturity model (SAMM) analysis can provide a benchmark for application security performance, and help build realistic plans for the future.
-
Webinar: When is Application Security Done?
Sponsored by: Veracode, Inc.Traditional patchwork approaches to application security does not scale to match these leaps in company needs, resulting in poor security coverage of the application infrastructure. Listen to this webinar to discover the growing needs of modern companies, and which security practices will scale to match what tomorrow holds.
-
ROI Case Study: Cloud-Application Security Service
Sponsored by: Veracode, Inc.A Global 2000 financial services organization previously relied on a traditional on-premises security scanning tool. View this Forrester case study now to see how this financial institution captured 192% ROI and reduced application vulnerabilities by 60% with a cloud-based security system.