Search Results for: security

Securing Your Digital Eco-System: The Role of Access Control in Network Security
In network security, access control plays a critical role. To learn all about that role, and to understand the evolution and future of access control, tap into this blog post.

TOPICS: .NET
Portnox

CIO Trends #10: Middle East
If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes are a big one. Also find out how Saudi Arabia could become the Silicon Valley of the Middle East. Read more about it in this issue of our CIO Trends Middle East series.

TechTarget ComputerWeekly.com

Application security: Five principles for ‘Shifting smart’
Optimize your application security testing by shifting smart, not just left. Learn five principles to secure your apps, including hardening your software stack and testing what matters most. Download this e-book to improve your application security strategy.

Contrast Security

IDC TechBrief: Interactive Application Security Testing
With modern application development operating at break-neck speeds, DevOps teams pressured by deadlines are often forced to compromise security for efficiency’s sake. This white paper examines the benefits of using interactive application security testing to mitigate the security risk and complexities of using DevSecOps. Read on to learn more.

TOPICS: .NET
Contrast Security

Voice of the Customer for Application Security Testing
Application security testing tools help analyze apps for vulnerabilities. This Gartner Peer Insights report provides real-user ratings and insights to aid your buying decision. Read the full report for a comprehensive view of the application security testing market.

Contrast Security

Revolutionizing DAST with IAST: A New Era in Application Security
While dynamic application security testing (DAST) has been a go-to AppSec testing technique for decades, it is not without its drawbacks. This is where interactive application security testing (IAST) comes into play, building off of DAST, but analyzing apps from the inside out, rather than from the outside in. Read this white paper to learn more.

TOPICS: .NET
Contrast Security

DEVSECOPS BUYER’S GUIDE: APPLICATION SECURITY
Read this DevSecOps Buyer’s Guide and get the comprehensive checklist you need to assess, vet, and purchase a DevSecOps platform that delivers accurate, continuous, and integrated security monitoring and remediation.

TOPICS: .NET
Contrast Security

CW Europe: December 2016 - February 2017
Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

TechTarget ComputerWeekly.com

What you need to know about Application Security Observability
As the network perimeter extends everywhere users are, security must move with it and be in place at the point of access. Download this infographic to learn 16 key things about observability and how it can help secure remote access and build user trust.

Contrast Security

Royal Holloway: Investigating the security vulnerabilities and solutions for connected and autonomous vehicle technologies
This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.

TechTarget ComputerWeekly.com