Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Developer

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Building Security Into the Application Development Lifecycle

by CheckmarxApr 04, 2022

Trying to fix security issues in software just before it goes into production or after it is released is difficult, time-consuming, and expensive. But how do you shift security left ? to bring security earlier into the software development lifecycle? In this webinar, you?ll learn the technologies and strategies to help integrate security and development teams to work together to plan security elements during design, frequently test the application for vulnerabilities, and quickly incorporate


Security Best Practices with Github

by Check Point Software TechnologiesApr 01, 2022

This eBook will explore 21 GitHub security practices that can increase the robustness of your repositories and help implement a security-first approach for your development teams.


Application Security Trend Report

by Check Point Software TechnologiesApr 01, 2022

Readers will explore security solutions for cloud-based mobile and IoT apps, as well as best practices for securing CI/CD pipelines — which is always appreciated for those employing declarative integration and deployment patterns.


Best Practices for Application Security in the Cloud

by ShiftLeftMar 01, 2022

The future of application security is in the cloud. Software development and application deployment continue to move from on-premise to various types of cloud environments. While the basics of application security (AppSec) carry over from on-premise, the cloud introduces new areas of complexity and a new set of requirements.

AppSec best practices for the cloud are somewhat different from standard AppSec best practices. Cloud applications tend to be more segmented into different


AppSec Shift Left Progress Report

by ShiftLeftFeb 25, 2022

As digital transformation progresses across industries, a security transformation is following right behind it. Learn how companies have rebuilt their core DevSecOps testing processes to release more secure code at scale.

This report examines how ShiftLeft CORE's SAST and Intelligent SCA increase the speed of vulnerability scans and narrow the scope of work to highlight reachable issues. These lead to a more robust AppSec program: More frequent scans Fixes earlier in the


The Top 10 API Vulnerabilities

by ShiftLeftFeb 25, 2022

You've probably heard of the OWASP top ten or the top ten vulnerabilities that threaten web applications. OWASP also periodically selects a list of top ten vulnerabilities that threaten APIs, called the OWASP API top ten.

In this eBook, we'll go through each of following vulnerabilities to understand how they happen, how to identify them, and how to prevent them: Broken Object Level Authorization Broken User Authentication Excessive Data Exposure Lack of Resources & Rate


How Enterprises Are Securing the Application Environment

by Dark ReadingFeb 22, 2022

Many IT teams have maintained their focus on application security last year, despite the challenges associated with operating during the global COVID-19 pandemic. But few made significant progress in scaling up their efforts to secure apps across the entire cloud and on-premises environments. Download this report from Dark Reading to learn more about the measures enterprises have adopted to ensure the security of their internally developed applications and third-party packaged applications.


The Many Risks of Modern Application Development

by CheckmarxFeb 03, 2022

The Many Risk of Modern Application Development (MAD)

Learn more from this deep dive into the new security risks that come along with the MAD methodology. Open source, including unknown origins and licensing issues Microservices, including complexity and faulty security measures Containers, including low visibility and sensitive data exposure IaC, including steep learning curves and configuration drift APIs, including redundancies, monitoring challenges, and training


Adapting to a Digital-Must World: Your Digital Transformation Checklist

by FormstackJan 18, 2022

Need help conquering your digital transformation goals? We know getting started can be hard, and the process can feel overwhelming. Use our digital transformation checklist as a guide to help you prepare for, plan, and implement your digitization goals.


IT Skills: Top 10 Programming Languages

by Informa TechNov 18, 2021

InformationWeek publishes a list of the most in-demand programming languages. The lineup of top coding languages includes a lot of familiar names, but the order of importance has changed a bit since over the last year. Many different organizations publish lists of popular programming languages, but they calculate that popularity in different ways. For example, some take surveys of developers and ask them which languages they like best. Others analyze job postings to see which skills employees


SUBTOPICS:

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and enterprises globally. Check Point Software's solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats.

Infinity's three core solution pillars deliver a unified security architecture supported by automatic, real-time threat intelligence uncompromised security and Gen V threat prevention across enterprise mobile (Check Point Harmony), cloud (Check Point CloudGuard), and network and data center environments (Check Point Quantum). Check Point Software provides the most comprehensive and intuitive single Point Software-of-control security management system. Check Point Software protects over 100,000 organizations of all sizes.

CloudGuard for Cloud Native Security

Security • Automated • Everywhere

From code to cloud, Check Point CloudGuard offers unified cloud native security across your applications, workloads, and network-giving you the confidence to automate security, prevent threats, and manage posture-at cloud speed and scale.


Checkmarx

Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world's developers while giving CISOs the confidence and control they need. As the AppSec testing leader, we provide the industry's most comprehensive solutions, giving development and security teams unparalleled accuracy, coverage, visibility, and guidance to reduce risk across all components of modern software — including proprietary code, open source, APIs, and infrastructure as code. Over 1,600 customers, including half of the Fortune 50, trust our security technology, expert research, and global services to securely optimize development at speed and scale. For more information, visit our website, check out our blog, or follow us on LinkedIn.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Formstack

Formstack's workplace productivity platform helps over 25,000 organizations digitize what matters, automate workflows, and fix processes — all without code.


Informa Tech

Headquarters: 5 Howick Place, London, SW1P 1WG

Informa Tech is a market leading B-to-B information provider with depth and specialism in the Information and Communications (ICT) Technology sector. Our purpose is to inspire the technology community to design, build and run a better digital world... and we do this by informing, educating and connecting those communities via our research, digital media, events and training products and services.


ShiftLeft

ShiftLeft enables software developers and application security teams to radically reduce the attackability of their applications by providing near-instantaneous security feedback on software code during every pull request.

By analyzing application context and data flows in near real-time with industry-leading accuracy, ShiftLeft empowers developers and AppSec teams to find and fix the most serious vulnerabilities faster. Using its unique graph database that combines code attributes and analyzes actual attack paths based on real application architecture, ShiftLeft's platform scans for attack context and pathways typical of modern applications, across APIs, OSS, internal microservices, and first-party business logic code, and then provides detailed guidance on risk remediation within existing development workflows and tooling.

ShiftLeft CORE, a unified code security platform, combines the company's flagship NextGen Static Analysis (NG SAST), Intelligent Software Composition Analysis (SCA), and contextual security training through ShiftLeft Educate to provide developers and application security teams the fastest, most accurate, most relevant, and easiest to use automated application security and code analysis platform.