ComputerWeekly.com Research Library

Powered by Bitpipe.com

Secure Application Development Research

  • The Benefits of a Software Defined Secure Branch with Versa Networks

    Sponsored by: Verizon

    Adopting software defined secure branch gives organizations a network landscape that is built for the digital enterprises of today. In this white paper, discover the benefits of a software defined secure branch with Versa Networks.

  • Getting Started with DevSecOps

    Sponsored by: ZeroNorth

    Collaboration between development and security teams is key to DevSecOps transformation and involves both cultural and technological shifts. In this webcast, Andrei Bezdedeanu, ZeroNorth VP of Engineering, discusses how to get started with DevSecOps and the resulting benefits.

  • Establish Secure DevOps Practices

    Sponsored by: Centrify Corporation

    The introduction of microservices, container-based architectures, and DevOps practices have led to a revolution in software development. However, security can be an afterthought when adopting these. In this webcast, explore DevSecOps and how it can help your organization take the "fast lane" through security into production.

  • 6 Steps to Comprehensive Container Security in AWS

    Sponsored by: Amazon Web Services

    Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.

  • Mitigating IP Risk: 3 Strategies to Ensure Open Source Compliance

    Sponsored by: Fossa

    Open Source is free, but there are responsibilities inherent to using open source as it comes with a set of obligations and risks. However, there are 3 strategies to mitigate IP risk and ensure open source compliance. Download this white paper to discover each of these approaches.

  • AWS Dynamic Duo Infographic

    Sponsored by: Symantec

    DevOps and InfoSec need to integrate their processes and work collaboratively to secure organizations as their reliance on public cloud infrastructure grows. Download this infographic to discover a 5-step action plan for embracing DevSecOps in your organization.

  • Automated Security at the Speed of DevOps

    Sponsored by: Trend Micro, Inc.

    As organizations implement DevOps on AWS, they need to understand the security implications. In this white paper, explore the main challenges businesses face at the intersection of DevOps and security. Also, learn best practices for integrating security within your development process from the start.

  • 6 Steps to Container Security

    Sponsored by: Trend Micro, Inc.

    Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.

  • Mastering Coverage

    Sponsored by: Contrast Security

    When it comes to application security testing, "coverage" is the third rail – a controversial topic for vendors and a seemingly intractable problem for practitioners – but it is the most critical part of your application security strategy. In this white paper, explore a framework for evaluating your application security testing coverage.

  • Introduction to IAST

    Sponsored by: Contrast Security

    Interactive Application Security Testing (IAST) is a technology for automatically identifying and diagnosing software vulnerabilities in applications and APIs. IAST continuously monitors your applications for vulnerabilities from within. In this white paper, learn everything you need to know about IAST.

  • The DevOps-Ready Security Program

    Sponsored by: Contrast Security

    Extending DevOps to your software application security team shifts security from being a bottleneck to an enabler. Successful security teams take a risk-based approach to enable product development without being a blocker or being left behind. In this white paper, explore 6 tips for an executive to bring security into the DevOps era.

  • Arxan Threat Analytics

    Sponsored by: Arxan

    The need has never been greater to protect apps that drive the economy. Securing these business critical apps against exploits is key to preventing brand damage, financial loss, intellectual property theft and government penalties. In this solution brief, learn how Arxan provides app-level security to protect against a range of threats.

  • Real-World Customer with Secure Application Infrastructure

    Sponsored by: VMware

    In this white paper, learn about secure application infrastructure, which architects security controls directly into the networks and endpoints where applications live—enabling protection to follow apps wherever they go. Also explore features of secure application infrastructure, as well as use cases for education, healthcare and more.

  • Qualcomm's Alex Gantman on Bug Bounties

    Sponsored by: HackerOne

    Qualcomm's technologies are powering the world of connected devices. But since Qualcomm's technology isn't the end product, it's difficult to determine the root of a device's vulnerability. In this case study, see what the VP of Engineering at Qualcomm, had to say about the company's approach to bug bounties and hacker-powered security.

  • How to Automate an API Security Program

    Sponsored by: Data Theorem

    Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.

  • 2019 Cyberthreat Defense Report

    Sponsored by: Gigamon

    In this 2019 Cyberthreat Defense Report, learn about the latest trends for the frequency & impact of cyberattacks, the adequacy of organizational security postures, the greatest barriers to establishing strong defenses, and more.

  • A Guide to Joining DevOps and Security

    Sponsored by: Trend Micro, Inc.

    If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.

  • RingCentral Case Study

    Sponsored by: Data Theorem

    RingCentral did not have the experts or a scalable platform to provide security coverage for their mobile apps. However, they have a requirement with their customers and partners to perform third-party security testing for all of their apps. In this case study, learn how RingCentral was able to address this issue using Data Theorem's App Secure.

  • Automate Compliance Audits Without the Staff

    Sponsored by: Data Theorem

    Data security and privacy are top of mind issues for security leaders and corporate boards. However, Agile and DevOps development models are moving too quickly for manual security assurance and compliance validation. In this webcast, learn how to automate the compliance and audit process.

  • 6 Steps to Comprehensive Container Security

    Sponsored by: Trend Micro, Inc.

    Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.

  • Run Applications Anywhere

    Sponsored by: Trend Micro, Inc.

    In this webcast, listen as Mark Nunnikhoven, VP of Cloud Research at Trend Micro discusses how you can implement a simpler strategy for maintaining security while running your applications in any environment.

  • Building Secure Software

    Sponsored by: Trend Micro, Inc.

    Building securely doesn't just mean the code you are creating is high quality and doesn't have any obvious security vulnerabilities; it's more complicated than that. You have to account for that complexity when checking for vulnerabilities. In this webcast, listen as Mark Nunnikhoven of Trend Micro discusses how to build securely.

  • Leveraging the Agility of DevOps Processes to Secure Hybrid Clouds

    Sponsored by: Trend Micro, Inc.

    In this white paper, explore how hybrid clouds bring changes to business models, methodologies, and technologies, the intersection of which represents an opportunity to efficiently improve an organization's cybersecurity while also enabling the speed of business.

  • Market Guide for Cloud Workload Protection Platforms: Assessment

    Sponsored by: Trend Micro, Inc.

    With the rise of cloud adoption, there is a fast-moving shift from traditional signature-based end-user security to a much more tactful and strategic approach to protecting cloud servers and workloads. In this resource, explore 5 buyer recommendations to address security and compliance risks inherent in public cloud environments.

  • The Beginners' Guide to Hacker-Powered Security

    Sponsored by: HackerOne

    Leveraging the wisdom and power of the vast white-hat hacker community is a new security expectation. In this white paper, learn the best practices for starting and running effective disclosure and bug bounty programs, and how to integrate hacker-powered security into your organization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.