ComputerWeekly.com Research Library

Powered by Bitpipe.com

Secure Application Development Research

  • Real-World Customer with Secure Application Infrastructure

    Sponsored by: VMware

    In this white paper, learn about secure application infrastructure, which architects security controls directly into the networks and endpoints where applications live—enabling protection to follow apps wherever they go. Also explore features of secure application infrastructure, as well as use cases for education, healthcare and more.

  • Qualcomm's Alex Gantman on Bug Bounties

    Sponsored by: HackerOne

    Qualcomm's technologies are powering the world of connected devices. But since Qualcomm's technology isn't the end product, it's difficult to determine the root of a device's vulnerability. In this case study, see what the VP of Engineering at Qualcomm, had to say about the company's approach to bug bounties and hacker-powered security.

  • 5 Best Practices for Kubernetes Network Security and Compliance

    Sponsored by: Tigera

    As businesses look to modernize their applications, many have turned to Kubernetes because of the benefits containerized workloads bring. However, businesses need to think about securing their applications. In this white paper, explore 5 best practices for securing Kubernetes at the network level.

  • How to Automate an API Security Program

    Sponsored by: Data Theorem

    Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.

  • A Guide to Joining DevOps and Security

    Sponsored by: Trend Micro, Inc.

    If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.

  • Security Report for In-Production Web Applications

    Sponsored by: Rapid7

    This report was designed to uncover new areas of risk in application security, and confirm the presence of threats, vulnerabilities, and security incidents that teams have previously only suspected. Download the report to explore the top 5 most common application security incidents including cross-site scripting, SQL injections and more.

  • RingCentral Case Study

    Sponsored by: Data Theorem

    RingCentral did not have the experts or a scalable platform to provide security coverage for their mobile apps. However, they have a requirement with their customers and partners to perform third-party security testing for all of their apps. In this case study, learn how RingCentral was able to address this issue using Data Theorem's App Secure.

  • Automate Compliance Audits Without the Staff

    Sponsored by: Data Theorem

    Data security and privacy are top of mind issues for security leaders and corporate boards. However, Agile and DevOps development models are moving too quickly for manual security assurance and compliance validation. In this webcast, learn how to automate the compliance and audit process.

  • The ROI of Security Orchestration and Automation

    Sponsored by: Rapid7

    Security operations are often slowed down by manual processes that would be better left to machines. As a result, security orchestration and automation is becoming an increasingly vital aspect of many organizations' security strategies. In this white paper, explore the benefits and value of security orchestration and automation.

  • 6 Steps to Comprehensive Container Security

    Sponsored by: Trend Micro, Inc.

    Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.

  • Run Applications Anywhere

    Sponsored by: Trend Micro, Inc.

    In this webcast, listen as Mark Nunnikhoven, VP of Cloud Research at Trend Micro discusses how you can implement a simpler strategy for maintaining security while running your applications in any environment.

  • Building Secure Software

    Sponsored by: Trend Micro, Inc.

    Building securely doesn't just mean the code you are creating is high quality and doesn't have any obvious security vulnerabilities; it's more complicated than that. You have to account for that complexity when checking for vulnerabilities. In this webcast, listen as Mark Nunnikhoven of Trend Micro discusses how to build securely.

  • Leveraging the Agility of DevOps Processes to Secure Hybrid Clouds

    Sponsored by: Trend Micro, Inc.

    In this white paper, explore how hybrid clouds bring changes to business models, methodologies, and technologies, the intersection of which represents an opportunity to efficiently improve an organization's cybersecurity while also enabling the speed of business.

  • Market Guide for Cloud Workload Protection Platforms: Assessment

    Sponsored by: Trend Micro, Inc.

    With the rise of cloud adoption, there is a fast-moving shift from traditional signature-based end-user security to a much more tactful and strategic approach to protecting cloud servers and workloads. In this resource, explore 5 buyer recommendations to address security and compliance risks inherent in public cloud environments.

  • The Beginners' Guide to Hacker-Powered Security

    Sponsored by: HackerOne

    Leveraging the wisdom and power of the vast white-hat hacker community is a new security expectation. In this white paper, learn the best practices for starting and running effective disclosure and bug bounty programs, and how to integrate hacker-powered security into your organization.

  • Application Security and How to Improve it

    Sponsored by: WhiteHat Security

    UBM conducted an online survey to explore common trends and challenges in app security, and to understand how security and development teams can work together to close these gaps. Click here for an inside look at the survey results.

  • Circumventing a Blacklist to Exploit Cross-Site Scripting

    Sponsored by: WhiteHat Security

    Discover how a cross-site scripting (XSS) vulnerability was found during an assessment of a financial services website and how the tester managed to get around the malicious script.

  • Static Analysis and the Truth About False Positives

    Sponsored by: WhiteHat Security

    Learn the truth behind false positives and how a source code scanning technology that is not programmed with assumptions can help your application security program today.

  • Why Websites Stay Vulnerable: And What You Can Do About It

    Sponsored by: WhiteHat Security

    There have been a number of data breaches in the news recently due to website vulnerabilities. In order to ensure your business isn't breached, incorporate security into your development process. In this webcast, explore key considerations for securing your web applications.

  • Top 7 Reasons Why Organizations Choose WhiteHat Security

    Sponsored by: WhiteHat Security

    In this infographic, find out the top 7 reasons organizations choose to work with WhiteHat Security.

  • 2018 Security Implications of Digital Transformation Report

    Sponsored by: Fortinet, Inc.

    While the potential of digital transformation is exciting from a business perspective, changes stemming from it can create anxiety for the cybersecurity team. In Fortinet's 2018 Security Implications of Digital Transformation Survey, examine the state of cybersecurity in organizations around the world from the lens of digital transformation.

  • DevSecOps at Hulu: When DevOps and Security Meet

    Sponsored by: Signal Sciences

    Today modern technical companies like Hulu have been adopting a culture where DevOps and security operate as one. In this webinar, hear from Emilio Escobar, Director of Information Security at Hulu, as he discusses how Hulu successfully brought security into the DevOps ecosystem, the benefits of a DevOps culture, and more.

  • A New Security Strategy that Protects the Organization When Work Is Happening from Anywhere

    Sponsored by: Citrix

    The concept of the "digital perimeter" has changed dramatically. Protecting the perimeter by building a wall too keep the bad guys out is no longer appropriate because of mobility, the cloud and constant remote access to internal systems. In this resource, learn how to better secure your organization against increasingly sophisticated attacks.

  • Secure App Development: Success Story

    Sponsored by: Micro Focus

    Tune into this webcast to learn about a security tool that was designed for developers and allows developers to jump into the tool at any point to create a secure software development lifecycle program.

  • Change Healthcare

    Sponsored by: Micro Focus

    Applications developed by Change Healthcare are used to process millions of healthcare transactions. Therefore, it is essential for the organization to ensure all data is secure. In this case study, learn how Fortify on Demand and Micro Focus Fortify WebInspect provided an affordable and effective means of finding and fixing vulnerabilities.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.