ComputerWeekly.com Research Library

Powered by Bitpipe.com

Secure Application Development Research

  • Q&A with Mary Ann Miller

    Sponsored by: Mitek Systems, Inc.

    In this Q and A, the fraud strategy leader at a mobile-only banking app sits down with the customer success leader at Mitek to talk about why customer experience is critical to business success and the vital role of security plays in the world of mobile banking applications. Read on to learn more.

  • Alert Logic: SIEMless Threat Management

    Sponsored by: Alert Logic

    Ensuring security for AWS applications requires resource-intensive visibility and monitoring, which may be too costly for some users. This checklist highlights the key considerations for self-assessing your program to help guide you towards a more secure AWS application environment.

  • Javascript vs Javascript: Performance Penalty of Api Hooking

    Sponsored by: Tala Security

    While it’s intuitive that defending your code is an important practice, there are times when that defense comes at a high cost.In this white paper, get an overview of the performance penalties associated with hooking browser JavaScript APIs to defend against JavaScript based threats.

  • 2018 Global Study on Application Security

    Sponsored by: Arxan

    Ponemon Institute conducted a survey to understand the risk that unprotected applications pose to businesses when running in unsecured environments and how organizations are addressing this risk in practice. In this research report, learn about key findings from the survey.

  • Cloud Security – Fix Governance not just technology

    Sponsored by: Capgemini

    When it comes to developing security management programs, most enterprises focus on technology service and functionality rather than thinking strategically. A security approach that prioritizes governance allows for organizations to centralize strategic efforts and ensure cloud adoption preparedness. Read on to learn more.

  • Accelerate Innovation with Automated Security

    Sponsored by: Sonatype

    The convenience of open source software for developers is unmatched. However, it’s critical to consider the vulnerabilities of open source software when developing security policies. In this white paper, go in-depth into the Nexus Platform for protecting your organization’s software development lifecycle.

  • Cloud can mean better security, not less security

    Sponsored by: Capgemini

    While security concerns are legitimate, businesses cannot afford to let security challenges hold them back from embracing cloud technology. Especially since cloud also offers security advantages. In this article, uncover 3 categories of cloud security concerns and explore the tactics and technologies that can enhance cybersecurity efforts.

  • Application Shielding with Intertrust whiteCriterion Code Protection

    Sponsored by: Intertrust

    Traditional parameter security measures lack the flexibility needed to meet mobile and IoT security risks. This white paper goes in-depth into the specific security challenges hackers are using to expose application vulnerabilities and defines the tactics and tools that can be implemented to mitigate these risks.

  • Key Protection with Intertrust whiteCriterion Secure Key Box

    Sponsored by: Intertrust

    Traditional perimeter security strategies are insufficient for protecting the growing number of remote devices being used to conduct business. This white paper overviews cryptographic key security, a threat that is becoming increasingly relevant in today’s digital environment, and highlights the common techniques used by hackers.

  • Gentek Global Secures Payment Systems with Application Shielding

    Sponsored by: Intertrust

    In this case study, discover how Gentek, a payment systems security company, partnered with Intertrust to deploy robust application shielding for its payment systems in order to protect user data and adhere to regulatory requirements of the payments industry.

  • Taking Steps to Protect Financial Mobile Applications

    Sponsored by: Intertrust

    Although the popularity of mobile applications has greatly simplified the use of day-to-day financial operations for the end user, it has created additional workload for ensuring their security. In this white paper, take an in-depth look into the world of financial mobile applications and learn practical ways to ensure protection.

  • Securing Digital Business with API Access Management

    Sponsored by: Okta

    Download this white paper to learn about OAuth 2.0. and how it can help provide an authorization framework that is both flexible and extensible while still allowing for centralized control and management.

  • Identity Layer for Web and Mobile Applications

    Sponsored by: Okta

    This data sheet provides an overview of the Okta’s Identity Platform: a series of services designed to address identity and access security concerns and help you launch your business applications. Read on to learn more.

  • Build vs. Buy

    Sponsored by: Okta

    IT teams have increasingly turned to pre-built tools to offload some of the burden of application development. Customer identity and access management (CIAM) presents developers with a broad range of challenges that a trusted identity layer can help offload easily. Read on to explore the challenges and benefits of CIAM.

  • How to Lock Down Git

    Sponsored by: Perforce

    While Git allows for developers to collaborate, it can also contribute to loss of intellectual property & significant security issues. This white paper covers tactics designed to mitigate the risks of Git & discusses best practices for securing native Git. Download this report to get started.

  • Security for Cloud and On-Premises Deployment

    Sponsored by: Mendix

    In this whitepaper, take an in-depth look at the Mendix platform, specifically as it relates to security for cloud, private cloud & on-premises environments. Download this report & discover why businesses across multiple industries trust Mendix to oversee the protection of their mission-critical data.

  • CW APAC - November 2019: Expert advice on container security

    Sponsored by: ComputerWeekly.com

    For all the promises of containers, changes in architectureand practices associated with the technology bring newchallenges and opportunities. In this handbook, Computer Weekly looks at the security challenges associated with container technology. Read the issue now.

  • Who’s Stalking Mobile App Users?

    Sponsored by: The Media Trust

    It’s difficult to disagree with the convenience of mobile applications, but have you ever considered the data being captured? Consumer awareness and regulations like GDPR & CCPA are creating a dramatic shift in app development and experience. In this report, find hidden vulnerabilities, the role of cookies & other findings.

  • Securing Cloud-Native Kubernetes Applications

    Sponsored by: Radware

    When businesses look to optimize and accelerate application development life cycles and deliver their applications in public clouds, security becomes a greater challenge. In this white paper, learn how to ensure the timely development and deployment of secure applications across hybrid computing environments.

  • Secrets to a Stronger Strategy for Container Security

    Sponsored by: Alert Logic

    AlertLogic experts have developed, tested, and refined 8 best practices for security in your environment. Read on for more explanation of these practices and some tips for how your Amazon Web Services (AWS) environment can help.

  • Rethinking Security for Digital Transformation

    Sponsored by: ZeroNorth

    As software becomes more critical to every business, understanding risk that may exists gains increasing importance. Download this report to learn how organizations currently tackle security in the context of digital transformation—and where these initiatives may go in the future.

  • VMs vs. containers: Which is better for security?

    Sponsored by: ComputerWeekly.com

    Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.

  • Using the AWS Well-Architected Framework to Support DevSecOps

    Sponsored by: nClouds

    In this blog, discover strategies for applying guidelines from the AWS Well-Architected Framework in a low-friction way to make it easier to prioritize security and advance your DevSecOps approach.

  • Getting Started with DevSecOps

    Sponsored by: ZeroNorth

    Collaboration between development and security teams is key to DevSecOps transformation and involves both cultural and technological shifts. In this webcast, Andrei Bezdedeanu, ZeroNorth VP of Engineering, discusses how to get started with DevSecOps and the resulting benefits.

  • Establish Secure DevOps Practices

    Sponsored by: Centrify Corporation

    The introduction of microservices, container-based architectures, and DevOps practices have led to a revolution in software development. However, security can be an afterthought when adopting these. In this webcast, explore DevSecOps and how it can help your organization take the "fast lane" through security into production.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.