Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Software

Access the latest white papers, research webcasts, case studies and more covering a wide range of topics like Mobile, Cloud and Data Analyitcs. Filter the library by ...

TOPICS: SUBTOPICS: COMPANY:
DATE RANGE:
TO
FORMAT:







Cybersecurity’s Next Wave: What Every Enterprise Should Know

by Dark ReadingJan 06, 2021

Cybersecurity technology and practices are undergoing a sea change. While COVID-19 quarantines literally turned enterprise networks upside down overnight, a new wave of online attacks put enterprise data at risk. Today?s security operations center, once focused entirely on perimeter defenses, is now abuzz with new disciplines, including threat hunting and incident response. And yesterday?s security technologies are being remade with new capabilities, including artificial intelligence,


A Quick Intro to Go Language Security Topics

by CheckmarxFeb 10, 2021

Are you new to the Go language (Golang), or are you an old-schooler who just wants a single resource highlighting all the security advantages of Go? You've come to the right place!

To help you quickly increase your knowledge of Go security in general, we've compiled this short summary of security topics you should be aware of when using Go. If you're ready to learn more... Let's Go!

This is a summary of the extended work found in The Go Language Guide — Web Application


The Application Security Testing Imperative

by CheckmarxFeb 10, 2021

This paper provides practical guidance for CISOs, CIOs, and DevOps leaders for designing an effective application security program to secure modern application development via an integrated approach. The paper also aims to equip application security practitioners with research data to support building the business case for AST investments.

In this White Paper, readers will learn: The Implications of Deadline-driven Decisions The Open Source Software Dilemma Demystifying DevSecOps


Nucleus Research: European Financial Services Institution ROI Case Study

by CheckmarxFeb 10, 2021

One of the largest European financial services institutions did not have a solution to address security vulnerabilities in their custom code. Falling under strict legal and industry standards for security and compliance, the organization considered manual approaches to address the security challenges they faced. However, they quickly realized they needed an integrated and automated way of improving the security of their custom code and looked to Checkmarx to remedy their situation.

As a


Open Source Security: The Ultimate Guide to Software Composition Analysis

by CheckmarxFeb 10, 2021

Open source software has facilitated the rapid evolution of application development and shortened development cycles. As with any new advancement in technology, there can be risks associated with open source components which organizations must identify, prioritize, and address. Security vulnerabilities can leave sensitive data exposed to a breach, complex license requirements can jeopardize your intellectual property, and outdated open source libraries can place unnecessary support and


2021 Top Enterprise IT Trends - Network Computing

by Network ComputingDec 17, 2020

We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you.

Here's what's inside: 2021 Requires Different Thinking on Networking for the New Enterprise Automation is No Longer an Option As 2021 Arrives, Data Center and WAN Virtualization Technologies Step Forward IT Challenges as Work-From-Home Becomes the Norm Plus, other 2021 Trends from Dark Reading, Data Center Knowledge, InformationWeek, ITPro


2021 Top Enterprise IT Trends - InformationWeek

by InformationWeekDec 22, 2020

We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you.

Here's what's inside: 2021 Outlook: IT Leaders Rely More on Intelligent Systems The Inevitable Rise of Intelligence In the Edge Ecosystem AIOps, DevSecOps, and Beyond: Exploring New Facets of DevOps Augmented Analytics Evolves to Tackle Enterprise Insights, Democratize Data Plus, other 2021 Trends from Dark Reading, Data Center Knowledge,


Assessing Cybersecurity Risk in Today’s Enterprises

by Dark ReadingNov 11, 2020

COVID-19 has created a new IT paradigm in the enterprise — and a new level of cybersecurity risk.

The COVID-19 pandemic has created an entirely new range of cybersecurity risks for enterprises in 2020. Thanks to the overnight shift of workers moving to home bases, organizations saw new threats to things like home networks, mobile devices, and collaboration tools.

Dark Reading's 2020 Strategic Security Survey shows that a high percentage of organizations are struggling


Why Chatbots Are So Popular Right Now

by InformationWeekOct 28, 2020

Enterprise organizations had already embraced the idea of chatbots before the pandemic. They are the top use case for artificial intelligence, and depending on implementation, an easy way for organizations to get started with AI. Enterprises have deployed chatbots in a range of use cases from IT help desk to human resources to sales to customer service.

In 2020, it's no surprise that organizations have increased their reliance on chatbots to help support operations as the COVID-19


The Malware Threat Landscape

by Dark ReadingNov 04, 2020

Cybercriminals continue to ramp up attacks against organizations in greater numbers than in the past. Phishing and viruses remain the most commonly detected attacks on enterprise networks. But ransomware and business email compromise (BEC) attacks appear poised to become the biggest threats over the next two years.

Download Dark Reading's 2020 Malware Threat Landscape Report to learn about the real makeup of online threats, as reported by the defenders who see them every day.


SUBTOPICS:

Checkmarx

Checkmarx is the global leader in software security solutions for modern enterprise software development. Checkmarx delivers the industry's most comprehensive Software Security Platform that unifies with DevOps and provides static and interactive application security testing, software composition analysis, and developer AppSec awareness and training programs to reduce and remediate risk from software vulnerabilities. Checkmarx is trusted by more than 40 of the Fortune 100 companies and half of the Fortune 50, including leading organizations such as SAP, Samsung, and Salesforce.com.


Dark Reading

Dark Reading is a security dashboard for IT professionals who don't have the time or the luxury of combing wirefeeds, multiple bug feeds, or vendor Websites to find out what's new or how well it works. Here, readers will get the latest on the security industry from our crack reporting team, hear directly from trusted voices and links to the best security content across the Web.


InformationWeek

InformationWeek is the leading multimedia Business Technology brand providing CIOs and IT decision makers with unique perspective and tools that work in lock step with their decision making process - from the setting of business strategies to the evaluation and recommendation of technology solutions. Through its cross-media platform, which includes online sites, magazine, events and research, InformationWeek provides editorial content developed by both journalists and CIO and IT peers delivered when and how they want it, 24/7. The InformationWeek audience of more than 2 million buyers includes CIOs, IT executives and business managers who span across industries, job titles, company sizes and global borders.


Network Computing

Network Computing: Connecting The Infrastructure Community The rise of virtualization, cloud computing, and mobility is causing immense changes inside and outside the data center. Different specialties and hardware systems are now converging onto one enterprise infrastructure system. At the same time, IT leaders have more options than ever for how to build infrastructure, how to deliver applications and services, and how to allocate budgets. In order to choose and implement the most efficient strategies and technology investments, IT leaders must be constantly learning, understand how to ask the right questions, and be able to explain infrastructure complexities in a manner that makes sense to their business environments. What's our role? IT professionals count on Network Computing and its affiliated conference, Interop, to show them the how and why behind next-generation networks, data centers, storage systems, communications, and cloud architectures. Interop is the live event for the IT community, while Network Computing provides IT practitioners with an online multimedia experience. Network Computing provides community members with in-depth analysis on new and emerging infrastructure technologies, real-world advice on implementation and operations, and practical strategies for improving their skills and advancing their careers. Our community is a trusted resource for IT architects and engineers who must understand business requirements as well as build and manage the infrastructures to meet those needs. How do we accomplish this? The Network Computing community brings together experienced editors, expert consultants and speakers, and IT professionals - providing a forum for them to solve problems, exchange ideas, and build relationships. We strive to analyze IT from the IT professional's point of view. Many of our authors are Interop speakers and track chairs and the most trusted voices in networking, mobility, data centers, storage, cloud, and UC. Through our interactive platform, community members are able to learn from these industry leaders and contribute their own ideas to ongoing discussions all year long.