ComputerWeekly.com Research Library

Powered by Bitpipe.com

Secure Application Development Research

  • Cloud with Confidence: Re-Imagine Cloud Security

    Sponsored by: Checkpoint Software Technologies

    According to Verizon’s 2020 Data Breach Investigations Report, human error accounted for 22% of all breaches. So, as cloud capabilities expand into all areas of the business, how can organizations ensure adequate configuration to avoid human error? Download the following e-guide for insight and guidance regarding this persistent issue.

  • Tata Communications’ Secure Web Gateway

    Sponsored by: TATA Communications

    As applications, infrastructures and data continue to move to the cloud, ensuring users have appropriate and reliable access – regardless of location – is critical. In this short video, discover how Tata Communications’ Secure Web Gateway enables users with enhanced visibility and security.

  • Best Practices for Successful Transformation Journey with Automation

    Sponsored by: Red Hat

    In this round table discussion, join leaders at Andorra Telecom, Rabobank and Discovery as they share best practices and success stories regarding their digital transformation and journey towards automation.

  • Best Practices for Effective Remote Working

    Sponsored by: Orange Business Services

    Gartner reports that 41% of employees are likely to work remotely at least some of the time post-coronavirus. This means that organizations are going to have to make their remote strategies work for the long-term as well as the short. Browse this e-book for tips on collaboration and ways to effectively deploy remote access technology.

  • Securing Assets Using Micro-Segmentation: A SANS Review of Guardicore Centra™

    Sponsored by: Guardicore

    With the increasing complexity and interconnectivity of organizational environments, IT professionals are left to wonder how to prevent the threat of network attacks. Enter microsegmentation: a network security architecture that laterally moves unapproved connections. Fewer permissions, less vulnerability. Dive into this SANS report to learn more.

  • Jitterbit Secures Dynamic Cloud Environment, Containers, and Microservices at Scale.

    Sponsored by: Lacework

    In this case study, discover how Jitterbit, and API service provider, was able to address issues related to monitoring activity within their expanding platform by partnering with Lacework to enable holistic activity tracking, streamlined compliance reporting and comprehensive security – without disruption.

  • Wavefront Secures DevOps Environments at Scale with Lacework

    Sponsored by: Lacework

    Due to the continually changing nature of their public cloud environment, Wavefront was facing visibility and security issues related to detecting and tracking vulnerabilities and threats. Download this white paper to see what led to their partnership with Lacework, as well as the results.

  • Auth0 Platform Introduction

    Sponsored by: Auth0

    This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.

  • Mistakes to Love: A Survey of Identity Mistakes

    Sponsored by: Auth0

    For leading application development teams, there seems to be debate around buying vs building. The following report provides in-depth insights from a survey into the successes and failures of identity professionals across their identity projects – both bought and build. Read on to unlock the key findings.

  • Web and Mobile Application Security Testing Solution Brief

    Sponsored by: WhiteHat Security

    According to the NTT 2020 Global Threat Intelligence Report, 55% of all attacks last year were application specific. Named a leader in a recent Gartner Magic Quadrant report, WhiteHat offers an application security testing bundle – designed to automate testing across the entire DevOps lifecycle. Download this solution brief to learn more.

  • Market Guide for Cloud Workload Protection Platforms

    Sponsored by: Capsule8

    Gartner’s 2020 Market Guide for Cloud Workload Protection Platforms dives into the latest developments in cloud native infrastructure security and offers recommendations on how enterprises can protect these components and as well as VMs, containers, and serverless workloads.

  • 5 Misconceptions About Dynamic Application Security Testing (DAST) for Mobile

    Sponsored by: NowSecure

    Dynamic Application Security Testing (DAST) plays a critical role in any mobile app security and privacy program. However, long-held misconceptions create confusion, leading to slower and infrequent testing. Read this article to bust 5 common misconceptions about DAST for mobile.

  • Cequence Security: API Sentinel Podcast

    Sponsored by: Cequence

    Tune into this podcast from Cequence Security to learn how API Sentinel can help you identify all your APIs, uncover security risks and address them to eliminate potential fraud or data loss.

  • Improve Digital Forensics and eDiscovery Efficiencies

    Sponsored by: IANS Research

    Learn how your security team can become more cost effective with digital forensics and eDiscovery.

  • Doing DevSecOps Right: Implementation & the Metrics that Matter

    Sponsored by: Capsule8

    DevSecOps is a crucial part of an emerging security and IT strategy, one which realizes that security has to be implemented early, often, and in a more flexible manner. But how can your company adopt these practices, and then measure their effectiveness? Watch this Capsule8 video to learn some effective DevSecOps principles and metrics.

  • How Can We Integrate Security into DevOps and Infrastructure as Code Pipelines?

    Sponsored by: Trend Micro

    As attack surfaces grow larger, it’s critical to incorporate security into every aspect of an organization. The emergence of DevSecOps enables the automation of security within the software development lifecycles, but implementation can be tricky. Download this white paper for recommendations and best practices.

  • Six Steps to Comprehensive Container Security in AWS

    Sponsored by: Trend Micro

    Containers grant developers the power to create and deliver applications faster and more consistently. But, as with any technology, there’s a catch. Containers can also increase infrastructure complexity, which in turn leads to overlooked security gaps. In this guide, find 6 steps you can take toward comprehensive container security in AWS.

  • Container Security 101: Understanding the Basics of Securing Containers

    Sponsored by: Palo Alto Networks

    Container environments bring a range of cybersecurity issues involving images, containers, hosts, runtimes, registries, and orchestration platforms, which all need to be secured. Not sure where to begin? Download Container Security 101: Understanding the Basics of Securing Containers for everything you need to know.

  • Advantages of Reassembly-Free Deep Packet Inspection (RFDPI)

    Sponsored by: SonicWall

    Download this tech brief to learn about the advantages of Reassembly-Free Deep Packet Inspection (RFDPI).

  • How to Build a DevSecOps Culture

    Sponsored by: Lacework

    Development and security overlap more and more each year. Fortunately, the rewards of building a DevSecOps culture are enterprise-wide. In this guide, find 5 steps your business can take to build a strong DevSecOps culture.

  • Securing Containers in a Cloud Environment

    Sponsored by: Lacework

    Periodic scans of static infrastructure can no longer fully protect your enterprise. Containers and containerized applications require real-time analysis. Read this white paper to learn how to simultaneously secure containers and your cloud environment.

  • Trend Micro Cloud One: Cloud Native Application Security

    Sponsored by: Trend Micro

    In this Trend Micro cloud One webinar, join Kyle Klassen, Product Manager of Cloud Native Application Security solutions and Mike Milner Director of Application security as they discuss the Cloud Native Applications framework.

  • The Role of Kubernetes in Cloud Security

    Sponsored by: Lacework

    Adoption of Kubernetes has skyrocketed in the last few years, but knowledge of the platform is still lacking. Download this white paper to learn about the role of Kubernetes in cloud security and how the landscape of security and DevOps is rapidly changing.

  • Building Security into Your Cloud IT Practices

    Sponsored by: Lacework

    Increasing competitive pressures to improve customer experience and speed up the software development lifecycle pushes IT managers and developers to build fast, but not necessarily to build securely. The following guide offers expert advice from 7 distinguished security leaders to help your DevOps teams incorporate security.

  • Creating a DevSecOps Culture in Your Company

    Sponsored by: Checkpoint Software Technologies

    As organizations continue to embrace cloud architectures as their preferred business environment, security methods need to change to reflect the needs of an evolving landscape. In this e-book, you’ll learn more about why organizations are embracing DevSecOps and the Shared Responsibility Model to meet cloud security challenges.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.