ComputerWeekly.com Research Library

Powered by Bitpipe.com

Secure Application Development Research

  • Automated Cloud Governance: The ONUG Collaborative

    Sponsored by: Concourse Labs

    As organizations continue to embrace cloud capabilities, ensuring security and governance across these new environments becomes more important than ever. This e-guide provides a comprehensive overview of the most effective way to achieve automated cloud governance (compliance & security at the speed of DevOps) – read on to get started.

  • 3 Common Kubernetes Security Mistakes and How to Avoid Them

    Sponsored by: VMware

    Tap into this white paper to find 3 common mistakes teams make when configuring Kubernetes workloads and how to correct them.

  • Webinar: Advanced Server Access & Your Journey to the Cloud Operating Model

    Sponsored by: Okta

    In this video, you will learn why you should adopt an "everything as code" approach to managing your IAM stack. Hear how to leverage Okta Advanced Server Access to streamline access to Cloud Infrastructure, with a peek into the upcoming product roadmap.

  • Leading the Way with Secure Mobile Keyless Hotel Access

    Sponsored by: Armor

    The Trustwave Global Security Report lists the hospitality industry as one of the top five industries subjected to network breaches. Customer data is sensitive but attainable for threat actors, and developers must use caution when developing keyless hotel access. Read this case study to learn how one business balanced usability and security.

  • AI, CWPPs & DevSecOps: The Future of Cybersecurity

    Sponsored by: Rezilion

    Artificial intelligence, DevSecOps and cloud security have all emerged as transformative technologies within the cybersecurity industry. This e-guide explores each of these areas by providing 3 expert articles. Read on to unlock your copy.

  • Application Security with NGINX

    Sponsored by: NGINX

    In today’s unpredictable security environment, organizations need to know how to implement effective security controls for their application infrastructure without impacting release velocity or application performance. In this webcast, learn how you can do just this, with specific business use cases as evidence.

  • Technology Insight for Software Composition Analysis

    Sponsored by: Sonatype

    In this exclusive Gartner report, learn how security and risk management teams can better account for open-source security. The report explores 5 key findings on open-source security and provides 4 concrete recommendations on where security leaders can start.

  • Evolving DevOps to support security – perspectives from the Puppet Labs State of DevOps report

    Sponsored by: ServiceNow

    In this State of DevOps report, explore recent research findings from Puppet Labs and ServiceNow as they home in on DevOps trends with an emphasis on security. Read the key takeaways here.

  • AppScan for Newbies

    Sponsored by: HCL Software

    In this edition of AppScan Tuesdays, Eitan Worcel of HCL AppScan will walk you through a demo of their security testing tools with his 17-year-old son. Eitan will walk his son, A true newbie to HCL AppScan, through the process of using the tool to find security vulnerabilities in web applications.

  • Nexus Innovator

    Sponsored by: Sonatype

    DevSecOps is such a new and evolving practice that it is helpful to hear from someone who can articulate, “Yes. DevSecOps works in theory AND in practice.” In this guide, explore the four-part DevSecOps evolution and how organizations can practically apply these practices to foster innovation and quality development.

  • Automating Secure Software Development at Instinet

    Sponsored by: Sonatype

    The financial impact of software errors is hard to ignore. Even a small bug can have disastrous consequences in the financial district. Learn how to automate and secure your software development process in this video.

  • How to Secure APIs at DevOps Speed

    Sponsored by: Contrast Security

    API vulnerabilities are becoming the most popular target for attacks, as traditional security measures often fail to protect APIs. Luckily, API security isn’t as far away as you think. In this eBook, learn how to begin an instrumentation-based approach to DevOps and API security.

  • Cloud with Confidence: Re-Imagine Cloud Security

    Sponsored by: Checkpoint Software Technologies

    According to Verizon’s 2020 Data Breach Investigations Report, human error accounted for 22% of all breaches. So, as cloud capabilities expand into all areas of the business, how can organizations ensure adequate configuration to avoid human error? Download the following e-guide for insight and guidance regarding this persistent issue.

  • Securing Assets Using Micro-Segmentation: A SANS Review of Guardicore Centra™

    Sponsored by: Guardicore

    With the increasing complexity and interconnectivity of organizational environments, IT professionals are left to wonder how to prevent the threat of network attacks. Enter microsegmentation: a network security architecture that laterally moves unapproved connections. Fewer permissions, less vulnerability. Dive into this SANS report to learn more.

  • Auth0 Platform Introduction

    Sponsored by: Auth0

    This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.

  • Mistakes to Love: A Survey of Identity Mistakes

    Sponsored by: Auth0

    For leading application development teams, there seems to be debate around buying vs building. The following report provides in-depth insights from a survey into the successes and failures of identity professionals across their identity projects – both bought and build. Read on to unlock the key findings.

  • Web and Mobile Application Security Testing Solution Brief

    Sponsored by: WhiteHat Security

    According to the NTT 2020 Global Threat Intelligence Report, 55% of all attacks last year were application specific. Named a leader in a recent Gartner Magic Quadrant report, WhiteHat offers an application security testing bundle – designed to automate testing across the entire DevOps lifecycle. Download this solution brief to learn more.

  • Improve Digital Forensics and eDiscovery Efficiencies

    Sponsored by: IANS Research

    Learn how your security team can become more cost effective with digital forensics and eDiscovery.

  • 5 Misconceptions About Dynamic Application Security Testing (DAST) for Mobile

    Sponsored by: NowSecure

    Dynamic Application Security Testing (DAST) plays a critical role in any mobile app security and privacy program. However, long-held misconceptions create confusion, leading to slower and infrequent testing. Read this article to bust 5 common misconceptions about DAST for mobile.

  • How Can We Integrate Security into DevOps and Infrastructure as Code Pipelines?

    Sponsored by: Trend Micro

    As attack surfaces grow larger, it’s critical to incorporate security into every aspect of an organization. The emergence of DevSecOps enables the automation of security within the software development lifecycles, but implementation can be tricky. Download this white paper for recommendations and best practices.

  • Container Security 101: Understanding the Basics of Securing Containers

    Sponsored by: Palo Alto Networks

    Container environments bring a range of cybersecurity issues involving images, containers, hosts, runtimes, registries, and orchestration platforms, which all need to be secured. Not sure where to begin? Download Container Security 101: Understanding the Basics of Securing Containers for everything you need to know.

  • What is Security's Role in Digital Transformation?

    Sponsored by: Rackspace

    When digital transformations first gained popularity, Gartner noticed a general lack of prioritization around security, predicting major service failures by 2020. Luckily, today, some 79% of global executives rank cyberattacks as one of their tip priorities. Read this article to learn more about the role of security in digital transformation.

  • Advantages of Reassembly-Free Deep Packet Inspection (RFDPI)

    Sponsored by: SonicWall

    Download this tech brief to learn about the advantages of Reassembly-Free Deep Packet Inspection (RFDPI).

  • Trend Micro Cloud One: Cloud Native Application Security

    Sponsored by: Trend Micro

    In this Trend Micro cloud One webinar, join Kyle Klassen, Product Manager of Cloud Native Application Security solutions and Mike Milner Director of Application security as they discuss the Cloud Native Applications framework.

  • Creating a DevSecOps Culture in Your Company

    Sponsored by: Checkpoint Software Technologies

    As organizations continue to embrace cloud architectures as their preferred business environment, security methods need to change to reflect the needs of an evolving landscape. In this e-book, you’ll learn more about why organizations are embracing DevSecOps and the Shared Responsibility Model to meet cloud security challenges.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.