Secure Application Development Research
-
E-Guide: Integrating security into the ALM lifecycle
Sponsored by: TechTarget SecurityIn this expert e-guide, readers will learn the risks businesses take by not taking security measures seriously and what can be done to help integrate security with application lifecycle management.
-
Beating web application security threats
Sponsored by: TechTarget SecurityApplication security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability.
-
E-Guide: Expert insights to application security testing and performance
Sponsored by: TechTarget SecurityTwo of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle.
-
Application security testing: Protecting your application and data
Sponsored by: TechTarget SecurityApplication security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.
-
E-Guide: Improving software with the building security in maturity model
Sponsored by: TechTarget SecurityThis expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.
-
Blog: DevOps for the mainframe
Sponsored by: IBMLearn the basics of DevOps and important information you need to know in order to create a successful strategy.
-
How to Secure Your Microsoft SharePoint Products
Sponsored by: Thawte Inc.This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order.
-
The Ten Must Haves for Secure Mobile Device Management
Sponsored by: ZenpriseBusinesses are changing their traditions as employees continue to adopt mobile phone practices. Enterprise mobility may be efficient, but it can also put important company data at risk. Learn more about how you can have secure mobile device management with this valuable resource.
-
Mobile Security Solutions: Securing & Leveraging Mobile Devices
Sponsored by: Entrust, Inc.This white paper explains how Entrust's software tool-kit can strengthen the security of mobile banking or transaction-based applications. Protect consumers with a multi-layered approach that secures all valuable information.
-
Presentation Transcript: Reduce the Cost of Being Secure by Building Security into your Development Process
Sponsored by: IBMIn this presentation transcript, explore the importance of application security and the business case for building security in from the start. Find out how your development tools can assist you in meeting your security objectives.
-
State of Software Security Report Volume 4
Sponsored by: Veracode, Inc.Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
-
Presentation Transcript: Are your applications cloud-ready?
Sponsored by: IBMThis presentation transcript discusses the importance of application security, and describes the tools and processes you should be putting in place to ensure that your applications are secure as you move them to the cloud.
-
Presentation Transcript: How Security is Well Suited for Agile Development
Sponsored by: IBMView this presentation transcript as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and learn how security is linked to the software development lifecycle.
-
Webcast: How Security is well suited for Agile development
Sponsored by: IBMView this webcast as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and how security is linked to the software development lifecycle.
-
Podcast: How Security is well suited for Agile development
Sponsored by: IBMTune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and why how security is linked to the software development lifecycle.
-
Empower your Developers
Sponsored by: Coverity by SynopsysThe repercussions of releasing unsecure software in today’s markets are severe – due in large part to the proliferation of constantly-connected, mobile devices. This white paper provides an overview of these challenges, and demonstrates the steps you can take to arm your developers against the risks of modern application development.
-
End-to-End Secure Client to Cloud Access
Sponsored by: IntelIn this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
-
E-Book: Technical Guide on Application Security: Secure Development
Sponsored by: IBMWhen security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization.
-
Presentation Transcript: Path to a Secure Application
Sponsored by: IBMThis presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle.
-
Using Cyclomatic Path Analysis to Detect Security Vulnerabilities
Sponsored by: McCabe Software, Inc.The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.
-
Beating Web Application Security Threats
Sponsored by: Thawte Inc.The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats.
-
Presentation Transcript: Three Reasons Why Security Fails and What to Do About It
Sponsored by: SophosWeb security seems to get tougher every year. Dynamic content, user generated content, and social networking increase the complexity of securing hosted web servers. Read this presentation transcript to learn about the latest web threats, which ones to be most concerned with, and what IT pros should do to help prevent them.
-
Presentation Transcript: Optimize Business and IT with New Generation Application Lifecycle
Sponsored by: SAP Community NetworkThis transcript provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
-
Optimize Business and IT With New Generation Application Lifecycle Management
Sponsored by: SAP Community NetworkThis webcast provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
-
Protecting Web Applications from Attack and Misuse
Sponsored by: CitrixApplication-layer attacks against business-critical web applications are the most serious IT security threat facing enterprises today. Read this white paper to learn how to improve web application security for your enterprise.