Security-related Design Reports

Four Ways to Increase Developer Buy in of AppSec
sponsored by Veracode, Inc.
WHITE PAPER: PH
Posted: 26 Jan 2022 | Published: 26 Jan 2022

Veracode, Inc.

Application security testing: Protecting your application and data
sponsored by TechTarget Security
EBOOK: Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.
Posted: 07 Nov 2011 | Published: 07 Nov 2011

TechTarget Security

E-Guide: Improving software with the building security in maturity model
sponsored by TechTarget Security
EGUIDE: This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.
Posted: 26 May 2011 | Published: 26 May 2011

TechTarget Security

E-Book: Technical Guide on Application Security: Secure Development
sponsored by IBM
EBOOK: When security practitioners attempt to introduce secure development practices into a development process and organization they are less than accepted. Development organizations tend to reject formal internal structure and process imposed from the outside. Read on to learn how to implement secure development practices in a development organization.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

IBM

The Essential Guide for Threat Intelligence Services: What to Look For
sponsored by TechTarget Security
EBOOK: This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.
Posted: 27 Feb 2015 | Published: 27 Feb 2015

TechTarget Security

Blog: DevOps for the mainframe
sponsored by IBM
WHITE PAPER: Learn the basics of DevOps and important information you need to know in order to create a successful strategy.
Posted: 18 Oct 2013 | Published: 18 Apr 2013

IBM

Using Cyclomatic Path Analysis to Detect Security Vulnerabilities
sponsored by McCabe Software, Inc.
WHITE PAPER: The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

McCabe Software, Inc.

A Guide to Joining DevOps and Security
sponsored by Trend Micro, Inc.
EGUIDE: If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
Posted: 09 May 2019 | Published: 03 May 2019

Trend Micro, Inc.

Podcast: How Security is well suited for Agile development
sponsored by IBM
PODCAST: Tune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and why how security is linked to the software development lifecycle.
Posted: 09 Jun 2011 | Premiered: Jun 7, 2011, 13:30 EDT (17:30 GMT)

IBM

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM