Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...


The Developer's Guide to Software Integrity

by Synopsys Inc.Oct 20, 2017

Only when security is treated with the same importance as quality can your software's integrity drive a proactive strategy, rather than a reactive response. Learn more in this ebook.

Introducing Security Champions to the DevSecOps Life Cycle

by Synopsys Inc.Oct 20, 2017

Developers are familiar with their organization's software and they also have a deep understanding of the technical issues. That's why you should recruit your developers as Security Champions.

Get the Most From Your Software Development Testing Budget

by Synopsys Inc.Oct 20, 2017

In this report, Gartner provides five recommendations for maximizing your spend and increasing your impact.

The Agile Security Manifesto

by Synopsys Inc.Jul 06, 2017

Learn how the four principles in the Agile Security Manifesto and your own Agile process can help you integrate critical security measures in a natural, efficient way.

Business Process Apps for Finance and Purchasing for Dummies

by K2Jul 07, 2016

This book explains how automated business workflows and forms help drive efficiency; explores difference finance and purchasing use cases; describes how to build automated, process-based workflows without being a developer; examines how businesses can use a single workflow solution across the entire organization; and provides key criteria to help you evaluate business process apps solutions for your organization.

Choosing the Right Digital Strategy for Your Organization

by K2Jul 07, 2016

Forrester's recent report, Your Digital Experience Technology strategy Starts with a Customer Journey Map, helps organizations develop the right strategy for future technology investments. In this white paper, K2 explores their recommendations and helps readers understand that by investing in the right digital strategy they can avoid many of the digital pitfalls that come with this move to a more digital experience. Read the white paper and receive the complete Forrester report for free.

How to Build Security Into Your Software Development Process

by CigitalJun 13, 2016

To standardize the software development life cycle (SDLC), organizations implement development methodologies to fulfill their objectives in a way that best suits their organizational goals. Whether you use Agile, Waterfall, or something in between, building security into your SDLC can improve efficiency and reduce costs if it's done the right way.

Download the complete eBook to: Learn how to add security to the various phases of your SDLC Understand how secure software development

Delivering Security in an Agile World

by CigitalMay 23, 2016

When delivering software features in an agile way, it's critical to ensure the software you're delivering is secure. To understand how this works, think of the Agile SDLC as a shipping company--instead of delivering software, you're delivering packages. In this detailed metaphor, you'll gain new perspectives on: Prioritizing features effectively Overcoming roadblocks to stay on schedule Implementing security activities along the way Examining the anatomy of Agile delivery Download the eBook

6 Reasons Designers Prototype

by CognianceApr 28, 2016

It's almost counter-intuitive. When creating a new product - whether that's a sexy pair of audio headphones or building an iOS/Android app, slowing down to build a prototype will invariably speed up the launch. But how can that be? Read this article to learn six reasons designers prototype and how this critical development step can get your product further. 3D models and click-able prototypes are the CEO's new best friend.

Evaluating and Choosing an IoT Platform

by ThingWorxApr 06, 2016

With the push for IoT-enabled solutions comes the need for reliable IoT platforms, especially for companies that require industrial-grade IoT capabilities. This O'Reilly report examines various features that heavy-equipment B2B industries should expect in an IoT platform, as well as the key attributes you should be looking for when choosing a platform vendor.



Cigital is one of the world's largest application security firms. We go beyond traditional testing services to help our clients identify, remediate, and prevent vulnerabilities in the applications that power their business.


Cogniance co-creates technology products and global brands. Mixing Silicon Valley DNA with Scandinavian design principles, we work with innovators and entrepreneurs to blend our design-led thinking with their ideas to plan, build, launch and evolve products that forge lasting relationships with their customers.


K2 business apps help you streamline processes - expense claims, customer on-boarding, travel authorizations or any other process you use at work. They connect people, data and systems to drive substantial time savings and offer full traceability on every process. Bring products to market faster, gain critical approvals quickly, meet regulatory and compliance demands with full confidence. K2 enables you to build apps the way you want, with components like forms and workflow.


ThingWorx is a business unit of PTC, a $1.4 billion global software company, where more than 700 employees are dedicated to the ThingWorx IoT technology platform. With more than $600MM invested in acquisitions and the development and integration of technologies for IoT, and with thousands of compatible partners and solutions, ThingWorx is creating innovation faster than ever thought possible.