ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • Secrets to a Stronger Strategy for Container Security

    Sponsored by: Alert Logic

    AlertLogic experts have developed, tested, and refined 8 best practices for security in your environment. Read on for more explanation of these practices and some tips for how your Amazon Web Services (AWS) environment can help.

  • Patch Management: Your Biggest Ally in the War Against Cybercrime

    Sponsored by: Panda Security

    The majority of attacks and exploits today take advantage of outdated systems and third-party applications, exploiting known vulnerabilities. In this white paper, learn about the dangers of vulnerabilities, including the new BlueKeep vulnerability, and ways you can keep your organization safe.

  • Cloud Application Security & Performance: Critical Considerations for SaaS Providers

    Sponsored by: Cloudflare

    Users today want faster, more personalized interactions when they use a SaaS app. It’s possible to build such experiences if you use the right tools. Download this white paper to learn what Cloudflare has to offer.

  • VMs vs. containers: Which is better for security?

    Sponsored by: ComputerWeekly.com

    Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.

  • API Security: What You Need to Do to Protect Your APIs

    Sponsored by: Data Theorem

    Despite growing awareness of API security, breaches continue to occur. API management and web application firewall vendors are addressing the problem. But, application leaders must design and execute an effective API security strategy to protect their APIs. In this Gartner report, discover recommendations for developing an API security strategy.

  • Security & Risk Management Summit: How to Approach Container Security

    Sponsored by: Veracode, Inc.

    Read this blog from the Gartner Security & Risk Management Summit for Gartner's top 3 recommendations on container security and how Veracode can help you meet their #1.

  • Hype Cycle for Application Security, 2019

    Sponsored by: Data Theorem

    Download the 2019 version of Hype Cycle for Application Security to learn about app security technology on the rise, at the peak, sliding into the trough, and more.

  • Building a Business Case for Expanding Your Appsec Program

    Sponsored by: Veracode, Inc.

    Code vulnerabilities and cyber threats are affecting absolutely everyone, and there is no longer any reason for security to be an afterthought in the application development process. Jump into this guide to learn how to build your case for a shift left in application security.

  • Application Security Beyond Scanning

    Sponsored by: Veracode, Inc.

    To make app security truly effective, there are 3 critical steps you must take beyond scanning to develop more secure code. Download this white paper to learn those 3 steps and how you can get started implementing them today.

  • Dynamic Analysis in a DevSecOps World

    Sponsored by: Veracode, Inc.

    Prioritizing security during development can become a hassle when trying to ensure an application delivers on operational functionality. Download this DevSecOps guide on dynamic testing and analysis benefits, and see how it can boost encapsulation from 22% to 39%.

  • Securing the Mobile and API Connected Work Space: Evernote Case Study

    Sponsored by: Data Theorem

    Evernote is a global software provider of mobile applications for individuals and teams. In this video, learn how Data Theorem helped Evernote identify and close 105 security issues and remove 17 harmful third-party libraries, all before releasing them to the public app stores.

  • Security for DevOps - Enterprise Survey Report

    Sponsored by: Data Theorem

    In order to get more insight into securing cloud-native applications, ESG surveyed IT and cybersecurity professionals responsible for evaluating, purchasing, and managing cloud security technology products and services. Read on for key research findings.

  • Infographic: How blockchain works

    Sponsored by: ComputerWeekly.com

    To get a solid understanding of how to use blockchain in an enterprise setting, CIOs must first grasp how a unit of value in a transaction moves from party A to party B. This infographic details how blockchain works from transaction initiation, through verification, all the way to delivery.

  • The Hacker Powered Security Report 2019

    Sponsored by: HackerOne

    Security vulnerabilities are a fact of life. For this reason, organizations are competing to attract hackers who have 1 key advantage over traditional methods: they can think like an attacker. In this 2019 research report, learn about the state of hacker-powered security.

  • How to Automate API Security

    Sponsored by: Data Theorem

    As software goes into production on a weekly, daily, and hourly basis, teams need to know if any APIs are vulnerable and be alerted to any changes in how it is being used. In this white paper, discover the benefits of automated API security, the problems with securing modern APIs, and more.

  • Oklahoma Municipal Power Authority Energizes Team's Secure Remote Access with TAC

    Sponsored by: PortSys

    Technology inventions are being integrated across the energy sector with legacy hardware and software systems. However, the patches on these legacy systems can't keep up with today's threats. In this case study, learn how these challenges led to Oklahoma Municipal Power Authority deploying Total Access Control to help provide secure remote access.

  • Web Browser-Based Attacks

    Sponsored by: Morphisec, Inc.

    Browsers are integral to an effective working environment but they also serve as the perfect cyberattack vector. Web-based attacks are one of the top methods of system compromise and they are on the rise. In this brief, explore common types of web threats.

  • Getting Started with DevSecOps

    Sponsored by: ZeroNorth

    Collaboration between development and security teams is key to DevSecOps transformation and involves both cultural and technological shifts. In this webcast, Andrei Bezdedeanu, ZeroNorth VP of Engineering, discusses how to get started with DevSecOps and the resulting benefits.

  • Reduce Phishing Risk in Minutes with Umbrella and Duo

    Sponsored by: Cisco Umbrella

    Cloud applications provide scale and cost benefits over legacy on-premises solutions. But with more users going direct-to-internet, the risk increases when users bypass security controls. In this webcast, learn how Umbrella and Duo can help you reduce this risk across all of your cloud and on-premises apps with a zero-trust strategy.

  • Trend Report: Employees Like to Use Unsanctioned Apps - and Don't Plan to Stop

    Sponsored by: Cisco Umbrella

    Employees are downloading apps to do their work faster, but this is causing risk to the business. IT can't secure what it can't see, which means threats can creep in. In this white paper, learn how Cisco Umbrella can help you discover which SaaS apps are being used, who's using them, and what risks they pose to your organization.

  • Making Application & Infrastructure Vulnerability Management More Effective

    Sponsored by: ZeroNorth

    Organizations are struggling to keep up with the dizzying pace it takes to roll out new software capabilities, which only deepens the challenge of keeping up with risks across applications and infrastructure. In this white paper, discover 5 steps you can take to help begin your Application and Infrastructure Vulnerability Management Program.

  • How Security Can Fuel Innovation

    Sponsored by: ZeroNorth

    This white paper discusses how, by shifting security left in the development process for true DevSecOps, it's now no longer an obstacle to DevOps innovation, velocity and competitiveness. Instead, it's an asset. Read on to learn how.

  • Establish Secure DevOps Practices

    Sponsored by: Centrify Corporation

    The introduction of microservices, container-based architectures, and DevOps practices have led to a revolution in software development. However, security can be an afterthought when adopting these. In this webcast, explore DevSecOps and how it can help your organization take the "fast lane" through security into production.

  • Do You Need a WAF, or Something Better than a WAF?

    Sponsored by: Shape Security

    The security market is drifting away from the use of web application firewall (WAF) technology for a number of reasons. In this blog post, learn about Shape Security's new solution which is a distributed anti-automation service, fronted by machine learning and backed by specialist operators.

  • Change Assurance for Your Business-Critical Applications

    Sponsored by: Onapsis

    CIOs, CISOs and their teams often delay updating critical applications because of the potential impact on business operations. In this brief, learn about Change Assurance by Onapsis which offers a business application cyber resilience solution that allows you to detect any operational issues, protect against attacks, and enforce policies.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.