EZINE:
In this week's Computer Weekly, we reveal the 13th annual UKtech50 list, with this year's most influential person award shared by secretaries of state for science, innovation and technology Michelle Donelan and Chloe Smith. Also, we examine mounting legal challenges faced by the emergence of generative AI tools such as ChatGPT. Read the issue now.
EBOOK:
This exclusive 3-part e-book explains how and why you should use mobile app management (MAM) to control enterprise apps. Inside, discover how you can securely enable successful enterprise mobility, and get an inside look at a MAM comparison: app wrapping vs. containerization.
EGUIDE:
In this expert e-guide, readers will learn the risks businesses take by not taking security measures seriously and what can be done to help integrate security with application lifecycle management.
EBOOK:
To secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.
EGUIDE:
This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.
PRESENTATION TRANSCRIPT:
This presentation transcript of the webcast “Path to a Secure Application” explains how automatic vulnerability scanning tools can greatly improve the speed and accuracy of code review, and integrate seamlessly into the development life cycle.
EGUIDE:
Security in DevOps, aptly named DevSecOps, is something that your development organization is going to have to deal with soon. This e-guide is your primer to bringing these two departments together when they come from such different perspectives. Learn how to improve collaboration, incorporate security earlier in development, and more.
EBOOK:
Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.
WHITE PAPER:
The repercussions of releasing unsecure software in today’s markets are severe – due in large part to the proliferation of constantly-connected, mobile devices. This white paper provides an overview of these challenges, and demonstrates the steps you can take to arm your developers against the risks of modern application development.
PRESENTATION TRANSCRIPT:
View this presentation transcript as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and learn how security is linked to the software development lifecycle.