Application Security Research
-
Top 10 Australia IT stories of 2018
Sponsored by: TechTarget ComputerWeekly.comIn this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to cement its position as a leader in mastering and deploying advanced information and communications technology across a large segment of its economy.
-
Computer Weekly – 27 November 2018: Software patching at scale – how to make it work
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.
-
DevOps: Latest developments & use cases in ASEAN
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, read more about the state of DevOps adoption across Southeast Asia, the importance of integrating security into DevOps processes and our top tips for securing management buy-in.
-
Application security: More important than ever
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
-
Cloud migration: Choosing the right strategy and tools
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, learn how to sell the value of cloud to the C-suite, roll DevOps tools into your migration plan, and avoid access control mistakes that could lead to data breaches that have hit the headlines of late.
-
Key software development trends to drive business success
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, you will learn more about leveraging DevOps to automate processes between development and IT teams, the importance of testing to keep internet of things devices safe from prying eyes and how one company has made use of open source software to automate the roll-out of application changes.
-
Application security: best practices and risks
Sponsored by: TechTarget ComputerWeekly.comSecurity professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
-
VMs vs. containers: Which is better for security?
Sponsored by: TechTarget ComputerWeekly.comPractitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
-
Infographic: How blockchain works
Sponsored by: TechTarget ComputerWeekly.comTo get a solid understanding of how to use blockchain in an enterprise setting, CIOs must first grasp how a unit of value in a transaction moves from party A to party B. This infographic details how blockchain works from transaction initiation, through verification, all the way to delivery.
-
Assess Secure Web Gateways to Suit Your Network Security Needs
Sponsored by: TechTarget SecuritySecure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.
-
Jargon Buster Guide to Container Security
Sponsored by: TechTarget ComputerWeekly.comThe definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.
-
DevSecOps delivers better business
Sponsored by: TechTarget ComputerWeekly.comFirms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.
-
A Guide to Joining DevOps and Security
Sponsored by: Trend Micro, Inc.If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
-
Secure DevOps Brings Better, Faster, Safer Software
Sponsored by: TechTarget SecurityIn the rush to implement DevOps, security is too often overlooked. But DevSecOps is essential in these hack-filled days. Learn how you can add security to software development today.
-
Three Questions to Ask Before you Migrate Apps to the Public Cloud
Sponsored by: Oracle DynMany firms assume public cloud is the best place to host all apps, but that's not always the case. Find out why in this essential guide.
-
Fundamentals of Endpoint Security: Anti-Malware Protection
Sponsored by: CitrixAccess this e-guide to learn about anti-malware protection and how endpoint security technology can prevent malware from infecting end-user computers and corporate networks.
-
The Evolution of ADC
Sponsored by: CitrixExplore the companies that offer the broadest selection of ADC features, and learn about the evolution of ADCs as demands have changed.
-
Unifying Endpoint Management with Windows 10
Sponsored by: VMwareA key pain point for enterprises using Windows 10 is that you need insight into which devices require updates and which already have them. Read this guide to learn about this new unified endpoint management system to empower your employees while simplifying IT's job.
-
Components: Increasing Speed and Risk
Sponsored by: Veracode, Inc.Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
-
Five Principles for Securing DevOps
Sponsored by: Veracode, Inc.Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
-
How We Build Risk Into Applications
Sponsored by: Veracode, Inc.There are a number of ways you could be building risks into your applications from design to production. Download this infographic to find out how to avoid building risks into your apps in 3 steps.
-
Veracode Secure Development Survey
Sponsored by: Veracode, Inc.Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
-
Software Today: What Applications Now Look Like
Sponsored by: Veracode, Inc.Download this infographic to see how modern applications are different today, and learn where you can take steps to prevent security risks throughout the development process.
-
Firewall Buyer's Guide
Sponsored by: Palo Alto NetworksYour network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.
-
What You SIEM is What You Get
Sponsored by: AT&T CybersecurityA properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.