Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Developer

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







2020 State of DevOps Report

by InformationWeekJul 30, 2020

Enterprises are quickly moving to DevOps in order to deliver higher quality software faster, and DevOps is maturing a result. However, having the right DevOps tooling isn't enough. A solid DevOps initiative must also have the right culture and processes in place, because people tend to be the biggest barrier to any type of organizational change. The 2020 State of DevOps reveals where the advancements are happening and why, as well as where the challenges remain.

Download the 2020 State


2021 Application Security Statistics Report Vol. 2

by WhiteHat SecurityMar 15, 2021

The state of application security is rapidly evolving and there is a need for a more frequent analysis of the threat landscape in order to keep up.

Our monthly AppSec Stats Flash report will complement the monthly AppSec Stats Flash podcast. Together, these assets will analyze key data points and trends to determine the current condition of application security within different industries.

In this volume, we discuss:
• How application security, both for web and


2021 State of the Software Supply Chain Report

by SonatypeOct 07, 2021

Now in its seventh year, Sonatype's 2021 State of the Software Supply Chain Report blends a broad set of public and proprietary data to reveal important findings about open source and its increasingly important role in digital innovation.


2021 Top Enterprise IT Trends

by Dark ReadingNov 13, 2020

We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you.

Here's what's inside: Businesses Rethink Endpoint Security for 2021 Ransomware Will Not Slow Down in 2021 Wrestling With New Vulnerabilities, Security Teams Seek Automation For Cloud Security Plus, other 2021 Trends from Data Center Knowledge, InformationWeek, ITPro Today, Network Computing


5 Reasons to Prioritize Software Security

by CheckmarxOct 02, 2020

The pace of digital transformation has reached a speed never before seen, forcing organizations into an "adapt or die" situation. Software is at the center of it all, placing increased pressure on DevOps leaders, AppSec managers, and developers to develop and deploy software faster to keep their organizations digitally competitive and relevant.

However, this need for speed comes at a price, as security often falls by the wayside. As the proliferation of software continues, bringing


A Quick Intro to Go Language Security Topics

by CheckmarxFeb 10, 2021

Are you new to the Go language (Golang), or are you an old-schooler who just wants a single resource highlighting all the security advantages of Go? You've come to the right place!

To help you quickly increase your knowledge of Go security in general, we've compiled this short summary of security topics you should be aware of when using Go. If you're ready to learn more... Let's Go!

This is a summary of the extended work found in The Go Language Guide — Web Application


Adapting to a Digital-Must World: Your Digital Transformation Checklist

by FormstackJan 18, 2022

Need help conquering your digital transformation goals? We know getting started can be hard, and the process can feel overwhelming. Use our digital transformation checklist as a guide to help you prepare for, plan, and implement your digitization goals.


An Integrated Approach to Embedding Security into DevOps

by CheckmarxOct 02, 2020

When software is everywhere, everything becomes an attack surface.

The root cause of many successful cyberattacks lies primarily in vulnerable software itself. The real question that needs to be asked is, "Can the industry do a better job of writing more-secure code, making software applications nearly impenetrable to cyberattacks?" Here at Checkmarx we believe the answer is yes. Checkmarx is dedicated to building software security solutions that address the root cause of nearly


Application Security Trend Report

by Check Point Software TechnologiesApr 01, 2022

Readers will explore security solutions for cloud-based mobile and IoT apps, as well as best practices for securing CI/CD pipelines — which is always appreciated for those employing declarative integration and deployment patterns.


AppSec Shift Left Progress Report

by ShiftLeftFeb 25, 2022

As digital transformation progresses across industries, a security transformation is following right behind it. Learn how companies have rebuilt their core DevSecOps testing processes to release more secure code at scale.

This report examines how ShiftLeft CORE's SAST and Intelligent SCA increase the speed of vulnerability scans and narrow the scope of work to highlight reachable issues. These lead to a more robust AppSec program: More frequent scans Fixes earlier in the


SUBTOPICS:

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and enterprises globally. Check Point Software's solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and advanced targeted threats.

Infinity's three core solution pillars deliver a unified security architecture supported by automatic, real-time threat intelligence uncompromised security and Gen V threat prevention across enterprise mobile (Check Point Harmony), cloud (Check Point CloudGuard), and network and data center environments (Check Point Quantum). Check Point Software provides the most comprehensive and intuitive single Point Software-of-control security management system. Check Point Software protects over 100,000 organizations of all sizes.

CloudGuard for Cloud Native Security

Security • Automated • Everywhere

From code to cloud, Check Point CloudGuard offers unified cloud native security across your applications, workloads, and network-giving you the confidence to automate security, prevent threats, and manage posture-at cloud speed and scale.


Checkmarx

Checkmarx is constantly pushing the boundaries of Application Security Testing to make security seamless and simple for the world's developers while giving CISOs the confidence and control they need. As the AppSec testing leader, we provide the industry's most comprehensive solutions, giving development and security teams unparalleled accuracy, coverage, visibility, and guidance to reduce risk across all components of modern software — including proprietary code, open source, APIs, and infrastructure as code. Over 1,600 customers, including half of the Fortune 50, trust our security technology, expert research, and global services to securely optimize development at speed and scale. For more information, visit our website, check out our blog, or follow us on LinkedIn.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


Formstack

Formstack's workplace productivity platform helps over 25,000 organizations digitize what matters, automate workflows, and fix processes — all without code.


InformationWeek

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


ShiftLeft

ShiftLeft enables software developers and application security teams to radically reduce the attackability of their applications by providing near-instantaneous security feedback on software code during every pull request.

By analyzing application context and data flows in near real-time with industry-leading accuracy, ShiftLeft empowers developers and AppSec teams to find and fix the most serious vulnerabilities faster. Using its unique graph database that combines code attributes and analyzes actual attack paths based on real application architecture, ShiftLeft's platform scans for attack context and pathways typical of modern applications, across APIs, OSS, internal microservices, and first-party business logic code, and then provides detailed guidance on risk remediation within existing development workflows and tooling.

ShiftLeft CORE, a unified code security platform, combines the company's flagship NextGen Static Analysis (NG SAST), Intelligent Software Composition Analysis (SCA), and contextual security training through ShiftLeft Educate to provide developers and application security teams the fastest, most accurate, most relevant, and easiest to use automated application security and code analysis platform.


Sonatype

Our developer-friendly full-spectrum software supply chain management platform helps more than 1,500 organizations and 15 million software developers simultaneously accelerate innovation and improve application security.


WhiteHat Security

WhiteHat Security has been in the business of securing web applications for 17 years. Combining advanced technology with the expertise of its global Threat Research Center (TRC) team, WhiteHat delivers application security solutions that reduce risk, reduce cost and accelerate the deployment of secure applications and web sites. The company's flagship product, WhiteHat Sentinel, is a software-as-a-service platform providing dynamic application security testing (DAST), static application security testing (SAST), and mobile application security assessments. The company is headquartered in San Jose, Calif., with regional offices across the U.S. and Europe.