Research Library

Powered by

Application Security Research

  • Auth0 Platform Introduction

    Sponsored by: Auth0

    This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.

  • CIO Trends #11: Benelux

    Sponsored by:

    The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.

  • Why AWS + Auth0

    Sponsored by: Auth0

    Implementing the right IAM or customer IAM tool in your AWS ecosystem requires thoughtful planning. This 52-page white paper provides a comprehensive collection of expertise, best practices and project planning insights for using AWS & Auth0 to set up an API gateway and protect your critical applications.

  • Mistakes to Love: A Survey of Identity Mistakes

    Sponsored by: Auth0

    For leading application development teams, there seems to be debate around buying vs building. The following report provides in-depth insights from a survey into the successes and failures of identity professionals across their identity projects – both bought and build. Read on to unlock the key findings.

  • Web and Mobile Application Security Testing Solution Brief

    Sponsored by: WhiteHat Security

    According to the NTT 2020 Global Threat Intelligence Report, 55% of all attacks last year were application specific. Named a leader in a recent Gartner Magic Quadrant report, WhiteHat offers an application security testing bundle – designed to automate testing across the entire DevOps lifecycle. Download this solution brief to learn more.

  • The Maturity of Zero Trust in Europe

    Sponsored by: Okta

    While only 18% of organizations in Europe have a defined strategy along Zero Trust principles, 93% of European organizations polled had implemented at least one security solution that mapped to a Zero Trust strategy. How does your organization compare regarding Zero Trust? View this infographic to learn how Europe is enhancing security.

  • 2020: The State of Endpoint Resilience Report

    Sponsored by: Absolute Software Corporation

    In this research report, 2020: The State of Endpoint Resilience Report, explore insights designed to help enterprises strengthen their security posture, and build the resilience needed to continue to face today’s cyber challenges head on.

  • Identity as a Service for Dummies

    Sponsored by: Okta

    According to the Okta 2020 “Businesses @ Work” report, the average number of apps per organization is currently 88, and the growth rate over the past 3 years has been 21 percent. Using this helpful guide, learn how companies are leveraging IDaaS to make IAM more scalable, more flexible and more cost effective.

  • ITProTV | CompTIA PenTest+: Analyze Scripts: Python

    Sponsored by: Cornerstone OnDemand

    This video will walk you through how to analyze Python scripts for the CompTIA PenTest+: and will explain the foundational knowledge of Python so that you are better equipped to write scripts and analyze and discern the purpose of scripts you come into contact with. Tune in to start your test prep.

  • ITProTV | Microsoft AZ 500: Create, Configure, Network, App Security Groups

    Sponsored by: Cornerstone OnDemand

    In this video, learn what Network Security Groups and Application Security Groups are, and explore the 7 steps required to filter network traffic with a network security group using the Azure Portal.

  • Cequence Security: API Sentinel Podcast

    Sponsored by: Cequence

    Tune into this podcast from Cequence Security to learn how API Sentinel can help you identify all your APIs, uncover security risks and address them to eliminate potential fraud or data loss.

  • 5 Misconceptions About Dynamic Application Security Testing (DAST) for Mobile

    Sponsored by: NowSecure

    Dynamic Application Security Testing (DAST) plays a critical role in any mobile app security and privacy program. However, long-held misconceptions create confusion, leading to slower and infrequent testing. Read this article to bust 5 common misconceptions about DAST for mobile.

  • 12 Reasons Why You Need Stronger Mobile App Security

    Sponsored by: NowSecure

    Whether it’s for internal communication, enhancing customer experience or part of a digital transformation initiative, mobile applications play a critical role and ensuring their protection is paramount. Download this infographic to discover 12 reasons why organizations need stronger mobile app security strategies.

  • How to Ensure NIAP Mobile Application Compliance

    Sponsored by: NowSecure

    Mobile applications allow for improved business operations and more seamless experience. However, for federal agencies, the heavy burden of ensuring each app meets the National Information Assurance Partnership (NIAP) security requirements causes a massive roadblock. Download this white paper to learn ease this headache.

  • Get Started with Application Security in 3 Easy Steps

    Sponsored by: Micro Focus

    It’s a common misconception that application security strategies are inherently disruptive to productivity. As organization rely more on apps for communication, security becomes paramount. The following guide provides 3 easy steps to help you get started with application security, read on to get started.

  • Six Steps to Comprehensive Container Security in AWS

    Sponsored by: Trend Micro

    Containers grant developers the power to create and deliver applications faster and more consistently. But, as with any technology, there’s a catch. Containers can also increase infrastructure complexity, which in turn leads to overlooked security gaps. In this guide, find 6 steps you can take toward comprehensive container security in AWS.

  • 3 Powerful Ways to Slash Mobile App Security Costs

    Sponsored by: NowSecure

    There’s never a bad time to find ways to cut costs, enhance productivity and expand security capabilities – especially when it comes to the constantly evolving mobile application landscape. Download this white paper to review 3 scenarios that showcase how automating mobile app security testing can save money while fostering productivity.

  • Infographic: Inside the Mobile Attack Surface

    Sponsored by: NowSecure

    As mobile applications continue to play a critical role in communication, productivity and user experience, ensuring security becomes increasingly important. Download the following infographic for an overview of the mobile application attack surface, which includes common areas for potential privacy and security gaps.

  • Application Security Risk Report

    Sponsored by: Micro Focus

    As organizations continue to embrace the productivity and collaboration benefits of business applications, it’s important to understand that hackers are constantly developing new techniques to exploit these applications. Download this research report for a comprehensive look at the trending attack methods and risks to keep an eye on.

  • Get the Facts: Mobile App Breaches Are Growing

    Sponsored by: NowSecure

    Imagine how it would feel to have hackers find and exploit vulnerabilities in your organization’s mobile apps before your mobile app security team discovers them. Unfortunately, this is the reality at some organizations. Continue to this article, which highlights key statistics and challenges regarding mobile app security.

  • State of Software Security

    Sponsored by: Veracode, Inc.

    In today’s business environment, almost every application includes open source libraries that enable productive and scalable functionality. In this research report, explore an in-depth analysis of the results from a Veracode study into the current state of open source application security.

  • Help Developers Understand and Use the OWASP Top Ten

    Sponsored by: IANS Research

    Each year, the Open Web Application Security Project (OWASP) publishes Top Ten list of common and critical web application security risks. This white paper provides an overview of the Top Ten, why it matters, and best practices for incorporating it into your workday. Read on to get started.

  • Retooling Cybersecurity Programs for the Cloud-first Era

    Sponsored by: Capsule8

    The amount of cloud-resident sensitive data is expected to double over the next 2 years, and organizations are preparing for the onslaught of threats by making careful reconsiderations within their cybersecurity strategy to include the protection of cloud data and applications, but how are they going about this? Read on to find out.

  • A cybersecurity professional's guide to securing a remote workforce

    Sponsored by: Forcepoint

    Mobile devices and cloud-based applications enable teams to work remotely and improve productivity, agility, and innovation. However, as these environments grow so too do the security challenges. In this e-book, explore today’s security risks and discover how to secure and support today’s remote workforce, along with their devices.


    Sponsored by: Lacework

    Open this white paper to get a better understanding of the potential risks associated with containers and how best to address these risks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.