Secure Application Development Research
-
Computer Weekly – 4 October 2022: Putting APIs to work
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.
-
Four Ways to Increase Developer Buy in of AppSec
Sponsored by: Veracode, Inc.PH
-
Dynamic Analysis in a DevSecOps World
Sponsored by: Veracode, Inc.PH
-
A Computer Weekly e-guide to SASE
Sponsored by: TechTarget ComputerWeekly.comCovid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
-
Understanding Your Open Source Risk
Sponsored by: Veracode, Inc.Developers are being asked to push out more software — and in shorter periods of time — than ever before. This has led to an increased reliance on open source libraries, and as this code is reused, it comes with a high risk of vulnerability. Access this e-book to learn more about the risks of open source and the challenges in securing it.
-
PERIMETER SECURITY NOISE LEAVES APPLICATIONS VULNERABLE TO ATTACKS
Sponsored by: Contrast SecurityLearn how you can get AppSec protection that can compensate with the necessary visibility, accuracy, scalability, and ease of deployment to keep pace with modern application vulnerabilities without generating false positives and false negatives.
-
CW APAC - November 2019: Expert advice on container security
Sponsored by: TechTarget ComputerWeekly.comFor all the promises of containers, changes in architectureand practices associated with the technology bring newchallenges and opportunities. In this handbook, Computer Weekly looks at the security challenges associated with container technology. Read the issue now.
-
VMs vs. containers: Which is better for security?
Sponsored by: TechTarget ComputerWeekly.comPractitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
-
Computer Weekly buyer's guide to mobile app development
Sponsored by: TechTarget ComputerWeekly.comIn this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.
-
A Computer Weekly e-guide to SASE
Sponsored by: TechTarget ComputerWeekly.comCovid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
-
A Guide to Joining DevOps and Security
Sponsored by: Trend Micro, Inc.If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
-
Five Principles for Securing DevOps
Sponsored by: Veracode, Inc.Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
-
DevSecOps: Putting the Security in DevOps
Sponsored by: SonatypeSecurity in DevOps, aptly named DevSecOps, is something that your development organization is going to have to deal with soon. This e-guide is your primer to bringing these two departments together when they come from such different perspectives. Learn how to improve collaboration, incorporate security earlier in development, and more.
-
Buyer's Essentials: What to Look for in an EMM Strategy
Sponsored by: TechTarget SecurityEMM products can contain a variety of features - for mobile device management, mobile app management, mobile content management and more. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.
-
Protect Your Web Applications from the OWASP Top 10
Sponsored by: IBMApplications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
-
Untangling Work and Personal Data with Enterprise MAM
Sponsored by: IBMThis exclusive 3-part e-book explains how and why you should use mobile app management (MAM) to control enterprise apps. Inside, discover how you can securely enable successful enterprise mobility, and get an inside look at a MAM comparison: app wrapping vs. containerization.
-
The Modern Mobility E-Zine: An Exclusive Look at Enterprise Mobility
Sponsored by: TechTarget Mobile ComputingAccess this e-zine to learn how the role of DevOps is changing as enterprise mobility matures. Read on here to see how fusing mobile app development and management can change the way IT delivers mobile information to users.
-
Be a Web App Security Superhero
Sponsored by: TechTarget SecurityTo secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.
-
Mastering Mobile Application Management: How to Adopt MAM
Sponsored by: IBMEnhance your MAM understanding with proven best practices that'll help you to solve app compatibility, security, and adoption issues.
-
The Essential Guide for Threat Intelligence Services: What to Look For
Sponsored by: TechTarget SecurityThis Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.
-
An Exclusive Guide for Promoting Enterprise Mobility Management
Sponsored by: TechTarget Mobile ComputingThis e-book takes readers through the process of enabling and managing a secure mobile workforce. Access this resource to understand how mobility can increase agility—and why security concerns, while important, shouldn't stop mobility in your organization from taking off.
-
WAN Optimization: Expert Guidelines to Management and Security
Sponsored by: TechTarget NetworkingWhat is the next step for WAN management? This expert guide explains why WAN optimization is now the norm and provides guidelines for an all-in-one strategy to minimize cost, complexity, and risk within your organization.
-
Application Security Advice: Stop Threats before They Start
Sponsored by: TechTarget Software QualityToo often, application developers treat security as an afterthought, and they believe last-minute security testing will be enough to safeguard their applications from threats. Consult this expert handbook to learn how to build in security at every stage of the application lifecycle.
-
An Integrated Approach to Managing Application Security
Sponsored by: IBMThis white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
-
Empowering Information Security with Desktop Virtualization
Sponsored by: CitrixIn this paper, CSO explores why desktop virtualization should be core to your information security foundation.