ComputerWeekly.com Research Library

Powered by Bitpipe.com

Secure Application Development White Papers

  • Four Ways to Increase Developer Buy in of AppSec

    Sponsored by: Veracode, Inc.

    PH

  • Dynamic Analysis in a DevSecOps World

    Sponsored by: Veracode, Inc.

    PH

  • A Computer Weekly e-guide to SASE

    Sponsored by: ComputerWeekly.com

    Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.

  • A Computer Weekly e-guide to SASE

    Sponsored by: ComputerWeekly.com

    Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.

  • Understanding Your Open Source Risk

    Sponsored by: Veracode, Inc.

    Developers are being asked to push out more software — and in shorter periods of time — than ever before. This has led to an increased reliance on open source libraries, and as this code is reused, it comes with a high risk of vulnerability. Access this e-book to learn more about the risks of open source and the challenges in securing it.

  • APPSEC PERFORMANCE PACKAGE

    Sponsored by: WhiteHat Security

    Whether your team is creating its first AppSec program or searching for expert program management to move security left, WhiteHat Security’s AppSec Performance Package might be able to help. Save this data sheet to see how WhiteHat can help your team identify program risks and secure more applications in less time, with less in-house resources.

  • Enable and Educate Your Team

    Sponsored by: WhiteHat Security

    Too many cyberattacks come from subpar employee enablement and/or security misconfigurations. WhiteHat is looking to resolve this issue with their eLearning Platform, designed to educate your users on common application security threats, best practices, incident remediation, and more – read on to learn more about the platform.

  • Continuous Application Security with HCL AppScan

    Sponsored by: HCL Software

    This Enterprise Strategy Group (ESG) Technical Review highlights ESG’s evaluation of HCL AppScan and how it helps developers continuously secure applications. The review also discusses how to integrate AppScan into CI/CD pipelines and support other aspects of DevSecOps initiatives – read on for the full review.

  • Web and Mobile Application Security Testing Solution Brief

    Sponsored by: WhiteHat Security

    According to the NTT 2020 Global Threat Intelligence Report, 55% of all attacks last year were application specific. Named a leader in a recent Gartner Magic Quadrant report, WhiteHat offers an application security testing bundle – designed to automate testing across the entire DevOps lifecycle. Download this solution brief to learn more.

  • Container Security 101: Understanding the Basics of Securing Containers

    Sponsored by: Palo Alto Networks

    Container environments bring a range of cybersecurity issues involving images, containers, hosts, runtimes, registries, and orchestration platforms, which all need to be secured. Not sure where to begin? Download Container Security 101: Understanding the Basics of Securing Containers for everything you need to know.

  • SENTINEL AUTO API

    Sponsored by: WhiteHat Security

    Traditional API testing is manual, time-consuming, and widely unpopular. In fact, less than 25% of organizations are testing their APIs. However, the critical nature of APIs requires them to be protected. In this data sheet, take a closer look at the key features of Sentinel Auto API and see if it meets for your API security needs.

  • PERIMETER SECURITY NOISE LEAVES APPLICATIONS VULNERABLE TO ATTACKS

    Sponsored by: Contrast Security

    Learn how you can get AppSec protection that can compensate with the necessary visibility, accuracy, scalability, and ease of deployment to keep pace with modern application vulnerabilities without generating false positives and false negatives.

  • The AI and Human Element Security Sentiment Study

    Sponsored by: WhiteHat Security

    60% of organizations have more faith in human-verified cyberthreat findings over AI-verified ones. In this security report, researchers examine the RSA Conference 2020 survey results to uncover growing trends in the industry. Gain insight into industry trends. Download the report here.

  • CW APAC - November 2019: Expert advice on container security

    Sponsored by: ComputerWeekly.com

    For all the promises of containers, changes in architectureand practices associated with the technology bring newchallenges and opportunities. In this handbook, Computer Weekly looks at the security challenges associated with container technology. Read the issue now.

  • VMs vs. containers: Which is better for security?

    Sponsored by: ComputerWeekly.com

    Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.

  • Computer Weekly buyer's guide to mobile app development

    Sponsored by: ComputerWeekly.com

    In this 14-page buyer's guide, Computer Weekly looks at their expanding variety, how they create organisational structure and what they have to offer in terms of security.

  • A Guide to Joining DevOps and Security

    Sponsored by: Trend Micro, Inc.

    If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.

  • Five Principles for Securing DevOps

    Sponsored by: Veracode, Inc.

    Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.

  • DevSecOps: Putting the Security in DevOps

    Sponsored by: Sonatype

    Security in DevOps, aptly named DevSecOps, is something that your development organization is going to have to deal with soon. This e-guide is your primer to bringing these two departments together when they come from such different perspectives. Learn how to improve collaboration, incorporate security earlier in development, and more.

  • Buyer's Essentials: What to Look for in an EMM Strategy

    Sponsored by: SearchSecurity.com

    EMM products can contain a variety of features - for mobile device management, mobile app management, mobile content management and more. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.

  • Protect Your Web Applications from the OWASP Top 10

    Sponsored by: IBM

    Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.

  • Untangling Work and Personal Data with Enterprise MAM

    Sponsored by: IBM

    This exclusive 3-part e-book explains how and why you should use mobile app management (MAM) to control enterprise apps. Inside, discover how you can securely enable successful enterprise mobility, and get an inside look at a MAM comparison: app wrapping vs. containerization.

  • The Modern Mobility E-Zine: An Exclusive Look at Enterprise Mobility

    Sponsored by: SearchMobileComputing

    Access this e-zine to learn how the role of DevOps is changing as enterprise mobility matures. Read on here to see how fusing mobile app development and management can change the way IT delivers mobile information to users.

  • Be a Web App Security Superhero

    Sponsored by: SearchSecurity.com

    To secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.

  • Mastering Mobile Application Management: How to Adopt MAM

    Sponsored by: IBM

    Enhance your MAM understanding with proven best practices that'll help you to solve app compatibility, security, and adoption issues.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.