Application Security Research
-
How to Recognize and Prevent Mobile Security Threats
Sponsored by: MicrosoftLearn how to recognize and prevent mobile security threats for application development and deployment, all while discovering how to not fall victim to the 2 most common mobility challenges.
-
Guide to Early Application Testing and Understanding Dev and Ops Responsibilities
Sponsored by: IBMExplore the importance of early application security testing. Learn from Owen Garrett, Head of Products for NGINX Inc., while he explains the security risks with containers and developing microservices.
-
How to Increase Security for your Login on Mobile Applications
Sponsored by: IBMIn this expert e-guide, learn techniques to improve security for your mobile login information and messaging applications to help stop unauthorized users from accessing your personal data.
-
How to Secure Mobile Applications in a Private Cloud
Sponsored by: IBMIn this expert e-guide, uncover the benefits and challenges of creating a private app store to control and monitor the delivery of properly secured mobile applications.
-
How to Boost Mobile Application Security
Sponsored by: IBMIn this expert e-guide, discover ways to boost mobile application security by performing regular assessments to help eliminate an enterprise's vulnerability to data breaches and attacks.
-
How to Build an Enterprise Application Security Program
Sponsored by: IBMIn this e-guide, learn the key steps to building an enterprise application security program to decrease exposure to potential attackers through statics and dynamic application testing.
-
Antimalware Protection and the Fundamentals of Endpoint Security
Sponsored by: OPSWAT incIn this expert e-guide, uncover the key features of endpoint antimalware protection, as well as how to deploy/manage endpoint antimalware tools.
-
Is the Endpoint Security Nightmare Ending?
Sponsored by: TechTarget SecurityIn our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.
-
Mobile Apps Risk: Protect without Hindering Productivity
Sponsored by: Blue CedarMobile apps having a reputation for being notoriously unsecure. Discover the threat that mobile apps pose to your business, and some immediate security priorities for your enterprise to tackle when dealing with mobile apps.
-
Mobile Security Risk Mitigation and Tips for Success
Sponsored by: Blue CedarMobile is the new norm, putting mobile app security into the spotlight. In this e-guide discover a different method of approaching mobile security by focusing on data over device, as well as 12 specific tips to conquer mobile security and common problems.
-
5 Post-Hot Patch App Ban Risks and the Value of Security Assessments
Sponsored by: Blue CedarDiscover the value of application assessments when determining security risk, and 5 areas that need to be considered for enterprise app security in the face of Apple's decision to ban hot patches.
-
Comprehensive Data Security In The Cloud
Sponsored by: Palo Alto NetworksIn this white paper, learn about some common cloud and SaaS application threats, as well as the 3 step guide to protecting your data in this new environment.
-
How to Resolve a Web Application Security Vulnerability
Sponsored by: Veracode, Inc.Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
-
Avoid Human Error with AWS CodeDeploy
Sponsored by: SplunkWant to avoid human error in code deployment? This e-guide covers how you can effectively use AWS CodeDeploy to automate code deployment to your servers and committing avoid manual errors.
-
DevSecOps: Putting the Security in DevOps
Sponsored by: SonatypeSecurity in DevOps, aptly named DevSecOps, is something that your development organization is going to have to deal with soon. This e-guide is your primer to bringing these two departments together when they come from such different perspectives. Learn how to improve collaboration, incorporate security earlier in development, and more.
-
How to Manage Oracle E-Business Suite Apps and Databases
Sponsored by: Data IntensityIn this expert e-guide, explore how to simplify and achieve a number of tasks that go into managing Oracle E-Business Suite (EBS) and databases, including patch updates, improving security, and managing cost-based optimizer stats.
-
Building an Application Security Program: Why Education is Key
Sponsored by: tCellGain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
-
Application Development Security Requires Forethought
Sponsored by: tCellLearn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
-
How mobile remote desktop apps work
Sponsored by: LogMeIn Rescue LensMobile remote desktop apps can be an important tool for enterprises in keeping up with today's on-the-go workforce. The benefits of greater accessibility mean they could be a strategic fit in a variety of enterprise environments. Learn how to select the right mobile remote desktop products for your business, and how they work.
-
Why DevOps + Security = A Bright Idea
Sponsored by: TechTarget SecurityBy combining DevOps and security, software developers will be able to produce more secure applications and infrastructures and defeat the long-standing bias that security is an obstacle, not aid, to good software development.
-
Are You Ready for RASP?
Sponsored by: TechTarget SecurityThis runtime application self-protection handbook covers the basics and offers advice on RASP implementation for IT security professionals.
-
How To Build An Enterprise Application Security Program
Sponsored by: Symantec + Blue CoatBuilding an effective application security program can seem daunting – but it doesn't have to be. In this e-guide, experts detail the first steps enterprises should take, and why education and training are key to the success of these programs.
-
The Rise of Cloud-based Application Security Vulnerabilities
Sponsored by: Symantec + Blue CoatWhile it can be beneficial to store app data in the cloud, it's causing many security concerns because of the sensitive nature of the information. Explore this e-guide to learn common vulnerabilities in cloud-based apps and best practices for properly protecting app data.
-
From DevOps to DevSecOps: Integrating Security
Sponsored by: BMCThey key to launching successful DevSecOps initiatives is to help teams spread security activities throughout the development lifecycle, a skillset that experts suggest many developers lack. Discover ways to integrate security into DevOps practices, and how to encourage collaboration within these teams.
-
How Etsy's DevOps Teams Fend off Fraudsters
Sponsored by: BMCIn this e-guide, experts reveal how innovative online businesses like Etsy are implementing next-generation web application firewalls that support DevSecOps initiatives. Learn what insiders are saying about guarding borders vs. securing during the development process, how the latter model could have prevented high-profile breaches, and more.