SQL Injection Reports

A Computer Weekly buyer's guide to next-generation programming tools
sponsored by TechTarget ComputerWeekly.com
EGUIDE: All kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.
Posted: 08 Feb 2021 | Published: 27 Nov 2019

TechTarget ComputerWeekly.com

Top DevSecOps certifications for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Check out some of the top DevSecOps certifications and trainings that can help professionals learn how to shift security left in the software development lifecycle.
Posted: 25 May 2022 | Published: 25 May 2022

TechTarget ComputerWeekly.com

SAST vs. DAST: What Are the Differencesand Why Are They Both Important?
sponsored by Veracode, Inc.
RESOURCE: If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Veracode, Inc.

Application security: best practices and risks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget ComputerWeekly.com

How To Build An Enterprise Application Security Program
sponsored by Symantec + Blue Coat
EGUIDE: Building an effective application security program can seem daunting – but it doesn't have to be. In this e-guide, experts detail the first steps enterprises should take, and why education and training are key to the success of these programs.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

Symantec + Blue Coat

Firewall Buyer's Guide
sponsored by Palo Alto Networks
WHITE PAPER: Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Palo Alto Networks

QRadar: Expert SIEM Product Overview
sponsored by IBM
EGUIDE: Looking for all the security features IBM's security information and event management (SIEM) tool has to offer? Look no further. Principal consultant, Karen Scarfone takes an unbiased look into QRadar. Learn how its features allow easy collection of log data from hosted assets, operating systems, applications, vulnerabilities, and user behavior.
Posted: 23 Jun 2016 | Published: 01 May 2016

IBM

Why DevOps + Security = A Bright Idea
sponsored by TechTarget Security
EBOOK: By combining DevOps and security, software developers will be able to produce more secure applications and infrastructures and defeat the long-standing bias that security is an obstacle, not aid, to good software development.
Posted: 22 Nov 2016 | Published: 18 Nov 2016

TechTarget Security

Three Questions to Ask Before you Migrate Apps to the Public Cloud
sponsored by Oracle Dyn
ESSENTIAL GUIDE: Many firms assume public cloud is the best place to host all apps, but that's not always the case. Find out why in this essential guide.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Oracle Dyn

DevSecOps: Putting the Security in DevOps
sponsored by Sonatype
EGUIDE: Security in DevOps, aptly named DevSecOps, is something that your development organization is going to have to deal with soon. This e-guide is your primer to bringing these two departments together when they come from such different perspectives. Learn how to improve collaboration, incorporate security earlier in development, and more.
Posted: 08 May 2017 | Published: 04 May 2017

Sonatype