ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Multimedia

  • Cloud Security: Enterprise Point of View

    Sponsored by: Dimension Data

    Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.

  • Overcoming the Challenges of Internal API Programs

    Sponsored by: Intel® Services

    Modernizing legacy applications can be handled gracefully when the right API system is considered from the very beginning. View this webcast now to find out how to overcome cultural obstacles in implementing an internal API program, and how to present the value of having such a program.

  • Symantec Data Loss Prevention for Mobile

    Sponsored by: Symantec Corporation

    This webcast introduces the highest-rated DLP solution with industry-leading detection technology.

  • Webinar: Practical Examples for Achieving and Maintaining DevOps Compliance for Financial Institutions

    Sponsored by: WANdisco

    Banking and financial institutions rely heavily on internally developed software to provide new products and services and are faced with an ever-changing regulatory environment that imposes tremendous challenges. This webinar will review specific compliance challenges, and how to automate compliance for open source software.

  • Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing

    Sponsored by: WANdisco

    Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.

  • Webinar: Scaling Git for the Enterprise

    Sponsored by: WANdisco

    This webinar answers the most common questions when attempting to scale Git for the enterprise including how to manage thousands of users, monitor performance, and ensure compliance with regulatory standards

  • BYOD Happens: How to Secure Mobility

    Sponsored by: Citrix

    View this on-demand webcast for an in-depth look at 10 ways to securely optimize mobility with an architecture that spans micro apps, cloud and data protection.

  • Best practices: Deliver next-gen automotive infotainment systems

    Sponsored by: IBM

    In the realm of next-generation automotive infotainment systems, innovation continues to grow exponentially, with new system features creating both trends and challenges. In this informative webcast, discover a fundamental approach for success in E/E engineering and learn how the ever-increasing complexities can be simplified.

  • Course: Insecure Temporary Files (CWE-377)

    Sponsored by: Klocwork

    This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.

  • Course: Improper Validation of Array Index (CWE-129)

    Sponsored by: Klocwork

    This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.

  • Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)

    Sponsored by: Klocwork

    Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.

  • Exposing the Beast - Custom API Mgt for the Enterprise

    Sponsored by: Intel Corporation

    In this exclusive webcast, explore the key enterprise categories for B2B, internal, and open Web API models and discover sample use cases that highlight how an API platform simplifies API delivery and management.

  • Deliver Virtual Apps and Desktops as Mobile Services

    Sponsored by: Citrix

    This video details a solution to BYOD that will give users the personalized experience they crave while keeping your data secure.

  • Video: Amazon Web Services API Security Overview

    Sponsored by: Intel

    Animation that shows how enterprise APIs can be managed using AWS hosted API management infrastructure that allows you to scale security along with apps in the cloud. Learn how public cloud apps can be quickly secured and expose for rapid mobile access. Learn about API management from the AWS cloud.

  • Global Security University: IAM Integration Classroom

    Sponsored by: IBM

    This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.

  • College Board Case Study: Quality Software is Secure Software

    Sponsored by: IBM

    In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe.

  • Driving Effective Application Security in the Enterprise: An End-to-End Approach to Addressing One of the Biggest Threats to a Business

    Sponsored by: IBM

    This crucial webcast examines how you can protect existing and developing applications and provides some best practices for ensuring end-to-end application security.

  • Healthcare Networking Classroom

    Sponsored by: TechTarget Health IT

    Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.

  • Sophos EndUser Protection Overview

    Sponsored by: Sophos

    This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.

  • New Reality of Stealth Crimeware Video

    Sponsored by: Intel

    An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.

  • HP Mobile Application Security

    Sponsored by: Hewlett Packard Enterprise

    Watch this informative video to learn more about some of the dangers that mobile apps pose to your business. Protecting everything from customer to enterprise data is an essential step to a secure environment. Discover the many facets of mobile security by tuning in now.

  • Using Mac and Windows apps side-by-side

    Sponsored by: Parallels, Inc.

    Listen to this podcast to learn how you can run Mac and Windows applications side-by-side

  • Supercharge delivery of IBM WebSphere Solutions

    Sponsored by: IBM

    View this webcast to discover tools that can help software development organizations to accelerate design and development, reduce the cost of quality, optimize security and compliance, and reduce deployment and operations costs.

  • Webcast: How Security is well suited for Agile development

    Sponsored by: IBM

    View this webcast as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and how security is linked to the software development lifecycle.

  • Podcast: How Security is well suited for Agile development

    Sponsored by: IBM

    Tune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and why how security is linked to the software development lifecycle.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.