Application Security Research
-
Mobilizing Windows Applications
Sponsored by: CitrixThis project design guide demonstrates a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security.
-
Defend Against Injection-based Attacks
Sponsored by: KlocworkThis paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
-
Challenging Some of the Myths About Static Code Analysis
Sponsored by: KlocworkThis paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle.
-
Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks
Sponsored by: Palo Alto NetworksIn this valuable resource, discover a security platform designed to keep up with today's ever-evolving threat landscape, which offers optimum network security without lowering network performance or reducing business productivity.
-
Cloud Based Application Penetration Testing Trial
Sponsored by: iViZInside this resource, unveil your access code for a 15-day trial of a cloud-based application penetration testing solution that combines automated testing with manual validation to provide optimum security monitoring.
-
BMC Release Lifecycle Management
Sponsored by: BMC SoftwareThis whitepaper covers a solution that will help ease your management of complex web applications and reduce the risks of failure.
-
Deep Security as a Service: Cloud Security for Amazon Web Services (AWS)
Sponsored by: Trend MicroAccess this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment.
-
EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager
Sponsored by: IBMMany security teams struggle with the limitations of traditional, isolated security tools. For today's complex IT infrastructure, you need a comprehensive, integrated way to manage the security of your applications, network, and data.
-
Cisco Any Device: Planning a Productive, Secure and Competitive Future
Sponsored by: CiscoDiscover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
-
Legacy Application Migration to the Cloud and Security
Sponsored by: TechTarget SecurityAccess this resource to gain expert advice on how to plan ahead for a secure migration of legacy applications to the cloud.
-
Endpoint Security IT Decision Center Handbook 2
Sponsored by: TechTarget SecurityAccess this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
-
Mobilizing Windows Apps
Sponsored by: CitrixThis white paper provides best practices for implementing secure remote access to Windows apps and data from any device. Read on now to learn more.
-
Mobile Security Insider's Edition
Sponsored by: TechTarget SecurityThis Insider Edition explores some of the most useful tools and strategies for reducing threats to your network and protecting your critical data in the era of BYOD.
-
Why You Need A Next-Generation Firewall
Sponsored by: Hewlett Packard EnterpriseThis white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
-
SAP platform showdown
Sponsored by: IBMIn this informative study, find out the real-word impact of deploying SAP on IBM's Power platforms, as opposed to SAP on HP x86, Dell x86 and HP Itanium, all running with Oracle DB.
-
System z, x86, UNIX: Which is more secure?
Sponsored by: IBMAccess this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost.
-
Analyst advice for IT security leaders
Sponsored by: IBMBusiness leaders around the world are increasingly concerned about the protection of intellectual property. In this informative Forrester report, view the results of a survey of 225 IT security leaders about their investments in information security.
-
Course: Improper Validation of Array Index (CWE-129)
Sponsored by: KlocworkThis course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
-
Course: Insecure Temporary Files (CWE-377)
Sponsored by: KlocworkThis course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
-
Next-Generation Security for Today's Data Center
Sponsored by: IBM and JuniperThis crucial resource discusses next-generation security solutions that can offer unparalleled protection against data exfiltration, website outages, and other serious threats against the data center.
-
Securing Enterprise Applications
Sponsored by: IBM and JuniperThis informative resource discusses a comprehensive set of application security solutions that provide highly effective security services for applications on your network, mobile devices, and even in the cloud.
-
Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
Sponsored by: KlocworkAccess this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
-
As data grows, so do the risks: How to improve data and app sec
Sponsored by: IBMAccess this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
-
Exposing the Beast - Custom API Mgt for the Enterprise
Sponsored by: Intel CorporationIn this exclusive webcast, explore the key enterprise categories for B2B, internal, and open Web API models and discover sample use cases that highlight how an API platform simplifies API delivery and management.
-
The Evolution of Server Load Balancing
Sponsored by: RadwareThis white paper introduces a solution that not only allows users to measure end-to-end application, network and browser rendering performance data in real-time, but also one that automatically accelerates web sites.