ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • Top 10 Australia IT stories of 2018

    Sponsored by: TechTarget ComputerWeekly.com

    In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to cement its position as a leader in mastering and deploying advanced information and communications technology across a large segment of its economy.

  • Computer Weekly – 27 November 2018: Software patching at scale – how to make it work

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.

  • DevOps: Latest developments & use cases in ASEAN

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about the state of DevOps adoption across Southeast Asia, the importance of integrating security into DevOps processes and our top tips for securing management buy-in.

  • Application security: More important than ever

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.

  • Cloud migration: Choosing the right strategy and tools

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, learn how to sell the value of cloud to the C-suite, roll DevOps tools into your migration plan, and avoid access control mistakes that could lead to data breaches that have hit the headlines of late.

  • Key software development trends to drive business success

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, you will learn more about leveraging DevOps to automate processes between development and IT teams, the importance of testing to keep internet of things devices safe from prying eyes and how one company has made use of open source software to automate the roll-out of application changes.

  • Application security: best practices and risks

    Sponsored by: TechTarget ComputerWeekly.com

    Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.

  • VMs vs. containers: Which is better for security?

    Sponsored by: TechTarget ComputerWeekly.com

    Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.

  • Infographic: How blockchain works

    Sponsored by: TechTarget ComputerWeekly.com

    To get a solid understanding of how to use blockchain in an enterprise setting, CIOs must first grasp how a unit of value in a transaction moves from party A to party B. This infographic details how blockchain works from transaction initiation, through verification, all the way to delivery.

  • Assess Secure Web Gateways to Suit Your Network Security Needs

    Sponsored by: TechTarget Security

    Secure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.

  • Jargon Buster Guide to Container Security

    Sponsored by: TechTarget ComputerWeekly.com

    The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.

  • DevSecOps delivers better business

    Sponsored by: TechTarget ComputerWeekly.com

    Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.

  • A Guide to Joining DevOps and Security

    Sponsored by: Trend Micro, Inc.

    If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.

  • Secure DevOps Brings Better, Faster, Safer Software

    Sponsored by: TechTarget Security

    In the rush to implement DevOps, security is too often overlooked. But DevSecOps is essential in these hack-filled days. Learn how you can add security to software development today.

  • Three Questions to Ask Before you Migrate Apps to the Public Cloud

    Sponsored by: Oracle Dyn

    Many firms assume public cloud is the best place to host all apps, but that's not always the case. Find out why in this essential guide.

  • Fundamentals of Endpoint Security: Anti-Malware Protection

    Sponsored by: Citrix

    Access this e-guide to learn about anti-malware protection and how endpoint security technology can prevent malware from infecting end-user computers and corporate networks.

  • The Evolution of ADC

    Sponsored by: Citrix

    Explore the companies that offer the broadest selection of ADC features, and learn about the evolution of ADCs as demands have changed.

  • Unifying Endpoint Management with Windows 10

    Sponsored by: VMware

    A key pain point for enterprises using Windows 10 is that you need insight into which devices require updates and which already have them. Read this guide to learn about this new unified endpoint management system to empower your employees while simplifying IT's job.

  • Components: Increasing Speed and Risk

    Sponsored by: Veracode, Inc.

    Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.

  • Five Principles for Securing DevOps

    Sponsored by: Veracode, Inc.

    Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.

  • How We Build Risk Into Applications

    Sponsored by: Veracode, Inc.

    There are a number of ways you could be building risks into your applications from design to production. Download this infographic to find out how to avoid building risks into your apps in 3 steps.

  • Veracode Secure Development Survey

    Sponsored by: Veracode, Inc.

    Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.

  • Software Today: What Applications Now Look Like

    Sponsored by: Veracode, Inc.

    Download this infographic to see how modern applications are different today, and learn where you can take steps to prevent security risks throughout the development process.

  • Firewall Buyer's Guide

    Sponsored by: Palo Alto Networks

    Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.

  • What You SIEM is What You Get

    Sponsored by: AT&T Cybersecurity

    A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.