Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Developer

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Redefining Network Security eBook

by CiscoMay 26, 2021

Today's dynamic applications run everywhere. Now you can keep up. Cisco is redefining network security: We're integrating dynamic policies that protect at the network and workload levels, so you can work more securely.

Read "Redefining Network Security eBook" to learn about:
• How Cisco Secure Workload provides comprehensive visibility
• Why Cisco Secure Workload is the perfect choice when you're adopting a zero-trust model
• How you can enable your


Tech Insights: SASE's Pandemic Boost Likely to Stick

by Network ComputingMay 05, 2021

With the proliferation of cloud computing, edge computing, mobility, and IoT, the IT enterprise is experiencing an explosion in the number of endpoints on the network — not to mention a huge increase in risk. All of that complexity requires a centralized approach to simply and securely manage a variety of disparate platforms. Secure Access Service Edge (SASE) is one framework that combines networking and security functions into a single, cloud-native environment that helps IT professionals


2021 Application Security Statistics Report Vol. 2

by WhiteHat SecurityMar 15, 2021

The state of application security is rapidly evolving and there is a need for a more frequent analysis of the threat landscape in order to keep up.

Our monthly AppSec Stats Flash report will complement the monthly AppSec Stats Flash podcast. Together, these assets will analyze key data points and trends to determine the current condition of application security within different industries.

In this volume, we discuss:
• How application security, both for web and


Open Source Security: The Ultimate Guide to Software Composition Analysis

by CheckmarxFeb 10, 2021

Open source software has facilitated the rapid evolution of application development and shortened development cycles. As with any new advancement in technology, there can be risks associated with open source components which organizations must identify, prioritize, and address. Security vulnerabilities can leave sensitive data exposed to a breach, complex license requirements can jeopardize your intellectual property, and outdated open source libraries can place unnecessary support and


Nucleus Research: European Financial Services Institution ROI Case Study

by CheckmarxFeb 10, 2021

One of the largest European financial services institutions did not have a solution to address security vulnerabilities in their custom code. Falling under strict legal and industry standards for security and compliance, the organization considered manual approaches to address the security challenges they faced. However, they quickly realized they needed an integrated and automated way of improving the security of their custom code and looked to Checkmarx to remedy their situation.

As a


A Quick Intro to Go Language Security Topics

by CheckmarxFeb 10, 2021

Are you new to the Go language (Golang), or are you an old-schooler who just wants a single resource highlighting all the security advantages of Go? You've come to the right place!

To help you quickly increase your knowledge of Go security in general, we've compiled this short summary of security topics you should be aware of when using Go. If you're ready to learn more... Let's Go!

This is a summary of the extended work found in The Go Language Guide — Web Application


The State of DevSecOps Report

by AccuricsJan 25, 2021

The latest State of DevSecOps report reveals that while exposed cloud storage services are a common theme, issues such as hardcoded keys are becoming increasingly common. Specifically, one in two deployments had unprotected credentials stored in container configuration files, which is worrisome given that 84% of organizations are using containers. The report studies the top cloud infrastructure risks plaguing organizations and illustrates how they contributed to three recent breaches at Capital


DevOps Guide to Terraform Security

by AccuricsJan 25, 2021

Using Terraform, an open source IaC tool developed by Hashicorp, to provision infrastructure provides many benefits to the management and operations of your environment. Its versatility, declarative language, and the productivity gains of using the same Infrastructure as Code (IaC) tooling across multiple cloud providers have made Terraform one of the most popular tools for infrastructure provisioning.

While there are many benefits to using Terraform as part of your infrastructure


2021 Top Enterprise IT Trends

by Dark ReadingNov 13, 2020

We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you.

Here's what's inside: Businesses Rethink Endpoint Security for 2021 Ransomware Will Not Slow Down in 2021 Wrestling With New Vulnerabilities, Security Teams Seek Automation For Cloud Security Plus, other 2021 Trends from Data Center Knowledge, InformationWeek, ITPro Today, Network Computing


Automotive Supplier Achieves Load Testing Efficiency

by Micro FocusAug 07, 2020

Michigan Manufacturing Company needed a way to manage more than 40 load generators to simulate the required virtual users load to measure key application performance.

Using Micro Focus LoadRunner Solutions, check out how they were able to: Achieve 50% cost saving through labor efficiencies and eliminated hardware Provision 40 cloud load generators (LGs) within minutes Attain flexible licensing for every testing scenario able to run tests faster while introducing a change-driven


SUBTOPICS:

Accurics

At Accurics™, we envision a world where organizations can innovate in the cloud with confidence. Our mission is to enable cyber resilience through self-healing as organizations embrace cloud native infrastructure. The Accurics platform self-heals cloud native infrastructure by codifying security throughout the development lifecycle. It programmatically detects and resolves risks across Infrastructure as Code before infrastructure is provisioned, and maintains the secure posture in runtime by programmatically mitigating risks from changes. Accurics enables organizations of all sizes to achieve cloud cyber resilience through free cloud-based and open source tools such as Terrascan™.


Checkmarx

Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world's developers while giving CISOs the confidence and control they need. As the AppSec testing leader, we provide the industry's most comprehensive solutions, giving development and security teams unparalleled accuracy, coverage, visibility, and guidance to reduce risk across all components of modern software — including proprietary code, open source, APIs, and infrastructure as code. Over 1,600 customers, including half of the Fortune 50, trust our security technology, expert research, and global services to securely optimize development at speed and scale. For more information, visit our website, check out our blog, or follow us on LinkedIn.


Cisco

Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. At Cisco customers come first and an integral part of our DNA is creating long-lasting customer partnerships and working with them to identify their needs and provide solutions that support their success.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Micro Focus

Micro Focus is one of the world's largest enterprise software providers. We deliver mission-critical technology that helps more than 40,000 customers worldwide manage core elements of their business and IT. With a broad product portfolio, one of the industry's largest patent collections, and a deep inventory of advanced analytics intellectual property, we bring you the innovation necessary to succeed in the rapidly evolving digital economy. That's High Tech. To succeed, you need to bridge existing and emerging technologies so you can balance short-term needs with long-term opportunities. We help you do this by delivering software that is open, integrated, and backward compatible, and by prioritizing your long-term success to help you run and transform your business at the same time. This combination yields lower risk, greater confidence, and a faster return on investment. That's how we keep it Low Drama. Together, Micro Focus delivers the technologies you need, and the outcomes you desire. That's High Tech, Low Drama.


Network Computing

Network Computing: Connecting The Infrastructure Community The rise of virtualization, cloud computing, and mobility is causing immense changes inside and outside the data center. Different specialties and hardware systems are now converging onto one enterprise infrastructure system. At the same time, IT leaders have more options than ever for how to build infrastructure, how to deliver applications and services, and how to allocate budgets. In order to choose and implement the most efficient strategies and technology investments, IT leaders must be constantly learning, understand how to ask the right questions, and be able to explain infrastructure complexities in a manner that makes sense to their business environments. What's our role? IT professionals count on Network Computing and its affiliated conference, Interop, to show them the how and why behind next-generation networks, data centers, storage systems, communications, and cloud architectures. Interop is the live event for the IT community, while Network Computing provides IT practitioners with an online multimedia experience. Network Computing provides community members with in-depth analysis on new and emerging infrastructure technologies, real-world advice on implementation and operations, and practical strategies for improving their skills and advancing their careers. Our community is a trusted resource for IT architects and engineers who must understand business requirements as well as build and manage the infrastructures to meet those needs. How do we accomplish this? The Network Computing community brings together experienced editors, expert consultants and speakers, and IT professionals - providing a forum for them to solve problems, exchange ideas, and build relationships. We strive to analyze IT from the IT professional's point of view. Many of our authors are Interop speakers and track chairs and the most trusted voices in networking, mobility, data centers, storage, cloud, and UC. Through our interactive platform, community members are able to learn from these industry leaders and contribute their own ideas to ongoing discussions all year long.


WhiteHat Security

WhiteHat Security has been in the business of securing web applications for 17 years. Combining advanced technology with the expertise of its global Threat Research Center (TRC) team, WhiteHat delivers application security solutions that reduce risk, reduce cost and accelerate the deployment of secure applications and web sites. The company's flagship product, WhiteHat Sentinel, is a software-as-a-service platform providing dynamic application security testing (DAST), static application security testing (SAST), and mobile application security assessments. The company is headquartered in San Jose, Calif., with regional offices across the U.S. and Europe.