Buffer Overflow Reports

DevSecOps delivers better business
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.
Posted: 08 Feb 2021 | Published: 29 Jan 2019

TechTarget ComputerWeekly.com

Key software development trends to drive business success
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, you will learn more about leveraging DevOps to automate processes between development and IT teams, the importance of testing to keep internet of things devices safe from prying eyes and how one company has made use of open source software to automate the roll-out of application changes.
Posted: 08 Feb 2021 | Published: 09 Oct 2017

TechTarget ComputerWeekly.com

CIO Trends #11: Benelux
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.
Posted: 08 Feb 2021 | Published: 02 Jul 2020

TechTarget ComputerWeekly.com

From DevOps to DevSecOps: Integrating Security
sponsored by BMC
EGUIDE: They key to launching successful DevSecOps initiatives is to help teams spread security activities throughout the development lifecycle, a skillset that experts suggest many developers lack. Discover ways to integrate security into DevOps practices, and how to encourage collaboration within these teams.
Posted: 14 Sep 2016 | Published: 07 Sep 2016

BMC

How to Boost Mobile Application Security
sponsored by IBM
EGUIDE: In this expert e-guide, discover ways to boost mobile application security by performing regular assessments to help eliminate an enterprise's vulnerability to data breaches and attacks.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

A Guide to Joining DevOps and Security
sponsored by Trend Micro, Inc.
EGUIDE: If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
Posted: 09 May 2019 | Published: 03 May 2019

Trend Micro, Inc.

How to Recognize and Prevent Mobile Security Threats
sponsored by Microsoft
EGUIDE: Learn how to recognize and prevent mobile security threats for application development and deployment, all while discovering how to not fall victim to the 2 most common mobility challenges.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Microsoft

Software Today: What Applications Now Look Like
sponsored by Veracode, Inc.
WHITE PAPER: Download this infographic to see how modern applications are different today, and learn where you can take steps to prevent security risks throughout the development process.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.
Posted: 19 Jul 2021 | Published: 20 Jul 2021

TechTarget ComputerWeekly.com