ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • Protecting Against the 10 Most Critical Web Security Risks

    Sponsored by: Progress Software Corporation Sitefinity

    This infographic identifies the top 10 most critical security risks to web applications – as outlined by the Open Web Application Security Project (OWASP) – and explores tactics and advice for defending against each threat. Read on to get started.

  • 5 Ways to Detect Application Security Vulnerabilities Earlier to Lower Cost and Risk

    Sponsored by: Green House Data

    Many traditional security measures take place too late in the development process to effectively find and fix vulnerabilities. Testing needs to happen earlier in development, and automation is key to making that happen. Learn how integrating automated security validation into your CI/CD pipeline can reduce risks for your business.

  • The Advantages of a SaaS-Based Application Security Solution

    Sponsored by: Veracode, Inc.

    In this infographic, discover 7 advantages of a SaaS-based application security program vs. on-premises.

  • Cloud-ready ADC: Simplify management of your complex environment

    Sponsored by: Citrix

    Traditional app delivery solutions help ensure availability, performance, and security, but not all solutions can bridge the gap between modern and legacy application environments. Download this white paper to learn about a cloud-ready application delivery controller that helps to simplify complex environments and adapt to changing needs.

  • AppSec Best Practices vs. Practicality

    Sponsored by: Veracode, Inc.

    When it comes to AppSec, teams must find a balance of best practices and practicality. Due to the realities of budgets, staff expertise, and time, not all best practices can be implemented successfully—but something is always better than nothing. In this guide, explore 5 key AppSec best practices and the practical steps your team can take now.

  • Scaling and Protecting Websites stretched by COVID-19

    Sponsored by: Barracuda

    The COVID-19 crisis is forcing organizations to dramatically accelerate the shift to doing business online. This means you’re suddenly ramping up the web applications that your business depends on. Join this webinar to get advice on how to stay secure while rapidly scaling up capacity.

  • Identity Proofing to Accelerate Customer Acquisition and Onboarding

    Sponsored by: Entrust, Inc.

    As the mobile banking industry grows more competitive, each new application user (or non-user) plays a critical role in the bank’s success. This solution brief takes a closer look at the key features and capabilities of Entrust Datacard’s Identity proofing solution, designed to improve security and customer experience.

  • How To Integrate Security In Your DevOps Environment

    Sponsored by: F5 Networks

    Application security has two challenges: Keeping pace with the evolution and sophistication of attacks, and keeping pace with the speed of modern application development...DevOps.

  • Finding the Restful Path to Certificate Lifecycle Automation and Integration

    Sponsored by: Entrust, Inc.

    As an IT leader, it’s important to have those you manage focused on the core functionalities of your business rather than be distracted by security processes. In this white paper, explore the features of Entrust Datacard’s PKI REST API, designed to shift some of the security busy-work away from your team. Read on to learn more.

  • How to Protect Against the OWASP Top 10 and Beyond

    Sponsored by: F5 Networks

    VERACODE NOTED THAT 72% OF ALL APPLICATIONS HAD AT LEAST ONE VULNERABILITY.

  • Automation's Rising Tide: How to Manage Bots in Today's World

    Sponsored by: F5 Networks

    Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work.

  • THE IMITATION GAME

    Sponsored by: F5 Networks

    IT executives, contributors, and IT security teams in a range of industries understand that their growing arrays of public-facing applications, whether those are web, mobile, or API-based, are the targets of automated bot attack campaigns.

  • Application security: best practices and risks

    Sponsored by: ComputerWeekly.com

    Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.

  • Endpoint Defense: Security Controls to Consider Now

    Sponsored by: TechTarget

    The total cost of a successful attack is over $5 million, according to Ponemon Institute's 2017 State of Endpoint Security Risk Report. Simply complete our Endpoint Security Survey to access our complimentary expert guide, Endpoint Defense: Security Controls to Consider Now.

  • Shifting Cloud Security Left with Infrastructure as Code

    Sponsored by: DivvyCloud

    DevOps has forever changed the software development lifecycle for the better. But what is the role of DevOps in ensuring cloud security and compliance? This white paper highlights how addressing key challenges can be addressed by shifting cloud security left – avoiding misconfigurations and misalignments. Read on to learn more.

  • NIST Application Security Revisions You Need to Know

    Sponsored by: Contrast Security

    NIST is a standard leader in the cybersecurity space that sets guidelines for organizations to follow across different areas of security. This landing page contains several useful resources focusing on the NIST revisions to their application security guidelines.

  • SAP Security Today: Five Challenges For CIOs

    Sponsored by: Onapsis

    As cybercrime rates rise annually, the role of the CIO has shifted with the need to constantly produce and review a holistic security strategy. In this e-book, take a look at the 5 challenges CIOs face today with SAP security and how to combat those challenges using a holistic SAP security strategy.

  • Continuous Application Security: A Unified Approach Across the SDLC

    Sponsored by: Contrast Security

    This webinar makes the case for instrumentation-based unified application security. With IAST and RASP, the security strategy can detect vulnerabilities, prevent exploits, secure data, and maintain compliance. Watch the webinar now to find out more.

  • Security Instrumentation is the Future of All Software

    Sponsored by: Contrast Security

    We’re in a software security crisis—and we have been for a while now. In both 2000 and 2019, applications had an average of 26.7 serious vulnerabilities. This webinar examines the state of application security and considers how strong instrumentation-based application security platforms are key to finally uniting development and security.

  • Sentinel Auto API

    Sponsored by: WhiteHat Security

    Traditional API testing is manual, time-consuming, and widely unpopular. In fact, less than 25% of organizations are testing their APIs. However, the critical nature of APIs requires them to be protected. In this data sheet, take a closer look at the key features of Sentinel Auto API and see if it meets for your API security needs.

  • Maintaining the Security Posture

    Sponsored by: Onapsis

    Based on the critical nature of Enterprise Resource Planning (ERP) applications, they are often under attack by cybercriminals looking to cause disruptions. In this white paper, explore the top threats facing your business-critical applications and discover a list of security recommendations to help you get started.

  • How to Stay Secure as a Retailer Using Cloud to Improve the Customer Experience

    Sponsored by: DivvyCloud

    Today’s retailers are facing stress on several fronts: Customer demands for improved experience, competitive pressures, and the need to ensure regulatory compliance. This cloud security guide for retailers breaks down these common challenges and offers pragmatic advice for developing a roadmap for security and compliance.

  • Data Privacy at Automox: Why SaaS Applications Deliver Superior Security

    Sponsored by: Automox

    Cloud computing has seen a meteoric rise from emerging trend to backbone of most technology infrastructures. The growing list of benefits that come from a cloud transformation often overshadow the most common concern – security. In this white paper, learn more about the current cloud security landscape and where it’s expected to go.

  • Cloud One Overview Solution Brief

    Sponsored by: Trend Micro

    In order to fully realize the benefits of cloud technologies, adequate cloud security is a critical pillar. In this solution brief, explore some of the key features and capabilities of Trend Micro Cloud One, a security services platform designed to provide the flexibility you need without slowing down your business or application delivery.

  • AppSec Guide: Complying with New NIST SP 800-53 IAST & RASP Requirements

    Sponsored by: Contrast Security

    The newly released AppSec requirements from the National Institute of Standards and Technology (NIST) outline the need to address specific software vulnerabilities in response to the increasing volume of automated attacks. This whitepaper highlights what to expect with the new requirements and provides 4 key steps for ensuring compliance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.