Secure Programming Reports

Computer Weekly – 4 October 2022: Putting APIs to work
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.
Posted: 30 Sep 2022 | Published: 04 Oct 2022

TechTarget ComputerWeekly.com

Cyber Crisis Communication Planning and Response Services
sponsored by Google
PRODUCT OVERVIEW: Magnifying awareness of an incident and engaging more stakeholders helps adversaries achieve their mission. Try an alternative tactic: Cyber Crisis Communication Services. This product overview explains Mandiant’s services and 3 pillars of an effective incident communications approach.
Posted: 19 Mar 2024 | Published: 19 Mar 2024

Google

CW APAC - November 2019: Expert advice on container security
sponsored by TechTarget ComputerWeekly.com
EZINE: For all the promises of containers, changes in architectureand practices associated with the technology bring newchallenges and opportunities. In this handbook, Computer Weekly looks at the security challenges associated with container technology. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Nov 2019

TechTarget ComputerWeekly.com

State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Veracode, Inc.

Optimize Business and IT With New Generation Application Lifecycle Management
sponsored by SAP Community Network
WEBCAST: This webcast provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
Posted: 15 Sep 2009 | Premiered: Sep 30, 2009, 12:00 EDT (16:00 GMT)

SAP Community Network

A Computer Weekly e-guide to SASE
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
Posted: 12 Nov 2021 | Published: 12 Nov 2021

TechTarget ComputerWeekly.com

Presentation Transcript: Reduce the Cost of Being Secure by Building Security into your Development Process
sponsored by IBM
PRESENTATION TRANSCRIPT: In this presentation transcript, explore the importance of application security and the business case for building security in from the start.  Find out how your development tools can assist you in meeting your security objectives.
Posted: 09 Dec 2011 | Published: 09 Dec 2011

IBM

An Exclusive Guide for Promoting Enterprise Mobility Management
sponsored by TechTarget Mobile Computing
EBOOK: This e-book takes readers through the process of enabling and managing a secure mobile workforce. Access this resource to understand how mobility can increase agility—and why security concerns, while important, shouldn't stop mobility in your organization from taking off.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

TechTarget Mobile Computing

Untangling Work and Personal Data with Enterprise MAM
sponsored by IBM
EBOOK: This exclusive 3-part e-book explains how and why you should use mobile app management (MAM) to control enterprise apps. Inside, discover how you can securely enable successful enterprise mobility, and get an inside look at a MAM comparison: app wrapping vs. containerization.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

IBM

Presentation Transcript: Are your applications cloud-ready?
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript discusses the importance of application security, and describes the tools and processes you should be putting in place to ensure that your applications are secure as you move them to the cloud.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

IBM