Security Development Lifecycle Reports

Computer Weekly – 13 June 2023: The most influential people in UK technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal the 13th annual UKtech50 list, with this year's most influential person award shared by secretaries of state for science, innovation and technology Michelle Donelan and Chloe Smith. Also, we examine mounting legal challenges faced by the emergence of generative AI tools such as ChatGPT. Read the issue now.
Posted: 12 Jun 2023 | Published: 13 Jun 2023

TechTarget ComputerWeekly.com

A Computer Weekly e-guide to SASE
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Covid has changed everything. Yet while it has truly as introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. secure access service edge (SASE) is one such case.
Posted: 29 Jul 2021 | Published: 28 Jul 2021

TechTarget ComputerWeekly.com

Computer Weekly – 4 October 2022: Putting APIs to work
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.
Posted: 30 Sep 2022 | Published: 04 Oct 2022

TechTarget ComputerWeekly.com

Four Ways to Increase Developer Buy in of AppSec
sponsored by Veracode, Inc.
WHITE PAPER: PH
Posted: 26 Jan 2022 | Published: 26 Jan 2022

Veracode, Inc.

The Modern Mobility E-Zine: An Exclusive Look at Enterprise Mobility
sponsored by TechTarget Mobile Computing
EZINE: Access this e-zine to learn how the role of DevOps is changing as enterprise mobility matures. Read on here to see how fusing mobile app development and management can change the way IT delivers mobile information to users.
Posted: 14 Apr 2015 | Published: 13 Apr 2015

TechTarget Mobile Computing

The Ten Must Haves for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER: Businesses are changing their traditions as employees continue to adopt mobile phone practices. Enterprise mobility may be efficient, but it can also put important company data at risk. Learn more about how you can have secure mobile device management with this valuable resource.
Posted: 01 Aug 2012 | Published: 01 Aug 2012

Zenprise

Protecting Web Applications from Attack and Misuse
sponsored by Citrix
WHITE PAPER: Application-layer attacks against business-critical web applications are the most serious IT security threat facing enterprises today. Read this white paper to learn how to improve web application security for your enterprise.
Posted: 27 Jul 2006 | Published: 01 Jul 2006

Citrix

Beating Web Application Security Threats
sponsored by Thawte Inc.
EBOOK: The rapid increase in usage, development and complexity of Web applications has created new opportunities for companies that employ them and hackers who attack them. This handbook delivers up-to-date information on security threats to Web 2.0 and rich Internet applications and expert advice on how to avoid those threats.
Posted: 18 Mar 2010 | Published: 18 Mar 2010

Thawte Inc.

Application security testing: Protecting your application and data
sponsored by TechTarget Security
EBOOK: Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.
Posted: 07 Nov 2011 | Published: 07 Nov 2011

TechTarget Security

Untangling Work and Personal Data with Enterprise MAM
sponsored by IBM
EBOOK: This exclusive 3-part e-book explains how and why you should use mobile app management (MAM) to control enterprise apps. Inside, discover how you can securely enable successful enterprise mobility, and get an inside look at a MAM comparison: app wrapping vs. containerization.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

IBM