ComputerWeekly.com Research Library

Powered by Bitpipe.com

Secure Application Development Multimedia

  • AppSec Stats Flash Podcast

    Sponsored by: WhiteHat Security

    In this episode of the AppSec Stats Flash podcast, join Setu Kulkarni, VP of Corporate Strategy and Business Development and Zach Jones, Sr. Director Security Research, as they dive into the first 3 key metrics of application security and explore the topic of shared responsibility for security. Listen here.

  • Whitehat Security Webinar

    Sponsored by: WhiteHat Security

    Dynamic Application Security Testing (DAST) enables AppSec teams with the ability to assess and address the actual risk of their applications – providing critical security capabilities to support DevSecOps initiatives. Watch this webinar to learn more about DAST and how it can support your AppSec goals.

  • Application Evolution

    Sponsored by: WhiteHat Security

    In this video, learn how the nature of IT security is changing and what that means for the roles and expertise required inside your organization, so you can successfully secure your applications – and your future.

  • The State of Application Security

    Sponsored by: WhiteHat Security

    Attackers continue to take advantage of application flaws to compromise organizations and put their customers at risk. This means that as much as Dev teams prioritize faster release cycles, it’s important that they don’t overlook security. In this WhiteHat webinar, examine the state of application security and what you can do to stay protected.

  • Reduce API Security

    Sponsored by: WhiteHat Security

    Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent history. How do we reduce API security risks? View this webcast to learn why testing may be the key.

  • Mobile Security App-titude

    Sponsored by: WhiteHat Security

    View Mobile Security App-titude: Best Practices for Secure App Design and Data Privacy to learn about PII – what data is being collected, how sensitive information can be compromised, how you can protect user data, and more.

  • DevSecOps Framework

    Sponsored by: WhiteHat Security

    Organizational infrastructure is becoming more and more vulnerable, and as a result, development teams are searching for ways to securely develop, build and deploy business-driving applications. So, what can these teams do to get started? They can begin by watching this webcast to learn the keys to a successful DevSecOps implementation.

  • Webcast: How Security is well suited for Agile development

    Sponsored by: IBM

    View this webcast as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and how security is linked to the software development lifecycle.

  • Podcast: How Security is well suited for Agile development

    Sponsored by: IBM

    Tune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and why how security is linked to the software development lifecycle.

  • End-to-End Secure Client to Cloud Access

    Sponsored by: Intel

    In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.

  • Optimize Business and IT With New Generation Application Lifecycle Management

    Sponsored by: SAP Community Network

    This webcast provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.