Coding Vulnerabilities Reports

A Computer Weekly e-guide to SASE
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
Posted: 29 Jul 2021 | Published: 28 Jul 2021

TechTarget ComputerWeekly.com

An Integrated Approach to Managing Application Security
sponsored by IBM
WHITE PAPER: This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

Presentation Transcript: Are your applications cloud-ready?
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript discusses the importance of application security, and describes the tools and processes you should be putting in place to ensure that your applications are secure as you move them to the cloud.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

IBM

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: In this paper, CSO explores why desktop virtualization should be core to your information security foundation.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

The Modern Mobility E-Zine: An Exclusive Look at Enterprise Mobility
sponsored by TechTarget Mobile Computing
EZINE: Access this e-zine to learn how the role of DevOps is changing as enterprise mobility matures. Read on here to see how fusing mobile app development and management can change the way IT delivers mobile information to users.
Posted: 14 Apr 2015 | Published: 13 Apr 2015

TechTarget Mobile Computing

The Essential Guide for Threat Intelligence Services: What to Look For
sponsored by TechTarget Security
EBOOK: This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

TechTarget Security

Using Cyclomatic Path Analysis to Detect Security Vulnerabilities
sponsored by McCabe Software, Inc.
WHITE PAPER: The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

McCabe Software, Inc.

Untangling Work and Personal Data with Enterprise MAM
sponsored by IBM
EBOOK: This exclusive 3-part e-book explains how and why you should use mobile app management (MAM) to control enterprise apps. Inside, discover how you can securely enable successful enterprise mobility, and get an inside look at a MAM comparison: app wrapping vs. containerization.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

IBM

Buyer's Essentials: What to Look for in an EMM Strategy
sponsored by TechTarget Security
EBOOK: EMM products can contain a variety of features - for mobile device management, mobile app management, mobile content management and more. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

TechTarget Security