SDLC Reports

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Accelerate Modernization with AI Driven Software Development Lifecycle
sponsored by AWS
EGUIDE: Accelerate your software development modernization with AI-driven efficiency and automation. Learn how LTIMindtree Genie can streamline over 30 SDLC use cases, deliver code and docs 3x faster, and reduce costs - all while ensuring high accuracy and quality. Read the full white paper to discover the benefits.
Posted: 09 Dec 2024 | Published: 09 Dec 2024

AWS

Machine Identity Security Architecture
sponsored by CyberArk
WHITE PAPER: As apps and their architectures have evolved, so have machine identities. The result? Such identities have proliferated in number and type, necessitating a modern machine identity security architecture. Unlock 10 pages of guidance in this white paper.
Posted: 02 Jan 2025 | Published: 27 Dec 2024

TOPICS:  .NET
CyberArk

Secure Coding Practices – Growing Success or Zero-Day Epidemic?
sponsored by Security Journey
ANALYST REPORT: This research report examines how organizations tackle secure software development. Key findings include the importance of integrating security planning and validation into the development lifecycle and the high ROI of secure coding training. Download the full report to learn how to improve your application security.
Posted: 08 Jan 2024 | Published: 16 Jan 2025

Security Journey

Top DevSecOps certifications for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Check out some of the top DevSecOps certifications and trainings that can help professionals learn how to shift security left in the software development lifecycle.
Posted: 25 May 2022 | Published: 25 May 2022

TechTarget ComputerWeekly.com

Your business deserves effective test automation services
sponsored by Qualitest Group
LANDING PAGE: Qualitest offers comprehensive test automation services to help you achieve faster, more accurate testing. Leverage their AI-powered tools and frameworks for efficient regression testing, continuous testing, and customized automation solutions. Read the full details.
Posted: 10 Jan 2025 | Published: 11 Jan 2025

Qualitest Group

2025 State Of Software Security a New View Of Maturity
sponsored by Veracode, Inc.
RESEARCH CONTENT: This report analyzes software security trends, showing progress and challenges. OWASP Top 10 pass rates improved, but fix times increased. It examines flaw prevalence, fix capacity, and security debt in organizations. Key metrics benchmark performance and guide improvement. Read the full report for insights on enhancing your security program.
Posted: 06 Mar 2025 | Published: 07 Mar 2025

Veracode, Inc.

Generative AI’s Role in Secure Software Development
sponsored by Veracode, Inc.
WHITE PAPER: In this white paper that features insights from Chief Product Officer at Veracode, Brian Roche, learn how generative AI can help developers deliver secure code quickly.
Posted: 05 Sep 2024 | Published: 13 Sep 2024

Veracode, Inc.

Endpoint Protection Isn’t Enough: Defend Your Software Development Lifecycle from Open Source Malware
sponsored by Sonatype
EBOOK: Open source malware infiltrates software development lifecycles, exploiting trusted components and bypassing protection. This e-book explores the dangers of open source malware, recent attacks, and strategies to protect your software supply chain. Learn why traditional security falls short and how to safeguard your development process.
Posted: 15 Mar 2025 | Published: 15 Mar 2025

Sonatype

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
EBOOK: Due to the sensitive data they contain, applications are often the target of cyberattacks – and unfortunately, application security approaches are rarely equipped to handle today’s threats. Read this e-book to learn how to modernize your application security approach.
Posted: 17 Mar 2021 | Published: 17 Mar 2021

TOPICS:  Cybersecurity
Veracode, Inc.

Enabling embedded solutions through container technology
sponsored by Wind River
WHITE PAPER: This white paper examines container technology in embedded solutions, focusing on security challenges and opportunities. It covers the role of SBOMs, digital twins, and open-source solutions in boosting security and efficiency. Discover how containerization is transforming IT. Read the full white paper for detailed insights and strategies.
Posted: 27 Feb 2025 | Published: 27 Feb 2025

Wind River

Trusted Software Supply Chains In Government
sponsored by Red Hat
WHITE PAPER: This white paper explores how government agencies can build trusted software supply chains to comply with Executive Order 14028. It outlines Red Hat's approach, including tools for vulnerability detection, SBOM generation, and continuous monitoring. Enhance security, boost productivity, and create a modern software factory by reading the paper.
Posted: 14 Mar 2025 | Published: 14 Mar 2025

Red Hat

The DevSecOps Playbook Practical Steps for Producing Secure Software
sponsored by Veracode, Inc.
EBOOK: What are practical steps for adopting DevSecOps? Find out in this 20-page e-book, which maps out how to build a modern software development workflow around security.
Posted: 05 Sep 2024 | Published: 09 Sep 2024

Veracode, Inc.

Application security: Five principles for ‘Shifting smart’
sponsored by Contrast Security
EBOOK: Optimize your application security testing by shifting smart, not just left. Learn five principles to secure your apps, including hardening your software stack and testing what matters most. Download this e-book to improve your application security strategy.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

Contrast Security

Understanding Modern Software Development
sponsored by Veracode, Inc.
RESOURCE: Download this resource to learn about how software development tools and processes changed recently, challenges developers run into while trying to balance these new tools and processes, and what security professionals can do to get developers fully on board with security.
Posted: 17 Mar 2021 | Published: 17 Mar 2021

Veracode, Inc.

Securing Containers And Infrastructure As Code For Cloud-Native Software: The Why And The How
sponsored by Veracode
EBOOK: Along with highlighting 3 prevalent risks to container and IaC (infrastructure as code) security, this e-book instructs readers on how to mitigate those risks with a holistic approach to security. Continue on to unlock these insights.
Posted: 08 Jun 2023 | Published: 08 Jun 2023

TOPICS:  .NET
Veracode

Focus: Telecoms of the future
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The telecoms sector in 2017 finds itself increasingly challenged as operators and end-users respond to multiple challenges, such as the emergence of software-based networks, the steady erosion of voice revenues, and the growth of 'free' communications services.
Posted: 08 Feb 2021 | Published: 11 Aug 2017

TechTarget ComputerWeekly.com

Leveraging Control-M To Exploit Cloud Technology And Devops Methodology
sponsored by BMC Software
WHITE PAPER: Control-M helps enterprises leverage cloud technology and DevOps by streamlining workflow management across traditional and multi-cloud environments. It eliminates workflow rework, accelerates cloud app development, and offers a single platform for managing workflows. Read this white paper to see how companies use Control-M for cloud transitions.
Posted: 13 Mar 2025 | Published: 13 Mar 2025

BMC Software

HOW TO KEEP UP WITH THE RAPIDLY EXPANDING SCOPE OF THE OWASP TOP TEN
sponsored by Contrast Security
EBOOK: The newest addition to the OWASP Top Ten was recently published to help organizations assess their application security efforts – but false positives could lead to unnecessary stress. Download now to learn how Contrast’s observability platforms is designed to keep up with the rapidly expanding scope of the OWASP Top Ten.
Posted: 01 Feb 2022 | Published: 01 Feb 2022

TOPICS:  .NET
Contrast Security

How to Keep Up with the Rapidly Expanding Scope of the OWASP Top Ten
sponsored by Contrast Security
EBOOK: The newest addition to the OWASP Top Ten was recently published to help organizations assess their application security efforts – but false positives could lead to unnecessary stress. Download now to learn how Contrast's observability platforms is designed to keep up with the rapidly expanding scope of the OWASP Top Ten.
Posted: 17 Dec 2024 | Published: 17 Dec 2024

Contrast Security

Focus: Mobility, virtualisation and desktop
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we share details of how mobility and virtualisation has helped organisations in the publishing and manufacturing industries meet their business objectives, while taking a look at some of the broader industry trends playing out in these technological areas.
Posted: 08 Feb 2021 | Published: 21 Aug 2017

TechTarget ComputerWeekly.com

Preparation is Key: Mitigating the Business Impact of Malware
sponsored by Sonatype
WHITE PAPER: Open source software is crucial for innovation but introduces security risks. With a 156% rise in open source malware and a 742% increase in supply chain attacks since 2019, organizations need proactive defenses. This white paper explores threats and offers strategies to secure your software supply chain. Read it to protect against cyber threats.
Posted: 15 Mar 2025 | Published: 15 Mar 2025

Sonatype

DEVSECOPS BUYER’S GUIDE: APPLICATION SECURITY
sponsored by Contrast Security
EGUIDE: Read this DevSecOps Buyer’s Guide and get the comprehensive checklist you need to assess, vet, and purchase a DevSecOps platform that delivers accurate, continuous, and integrated security monitoring and remediation.
Posted: 15 Feb 2022 | Published: 16 Feb 2022

TOPICS:  .NET
Contrast Security

Top 10 software development stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: There has never been a better time to be in software development. After years of being regarded as non-core, software development has quickly become a differentiator as businesses embark on digital transformations. Here are Computer Weekly's top 10 software development articles of 2019.
Posted: 08 Feb 2021 | Published: 27 Dec 2019

TechTarget ComputerWeekly.com

The Complete Guide to CNAPPs
sponsored by CrowdStrike
EBOOK: Cloud-conscious adversaries are on the hunt for any weakness they can exploit to gain access to systems, applications, and data. This guide is your ultimate resource for understanding what Cloud-Native Application Protection Platforms (CNAPPs) are and why they're a critical component of any modern cloud security strategy.
Posted: 27 Mar 2025 | Published: 27 Mar 2025

CrowdStrike

The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com