SQL Injection Reports

DevOps: Latest developments & use cases in ASEAN
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the state of DevOps adoption across Southeast Asia, the importance of integrating security into DevOps processes and our top tips for securing management buy-in.
Posted: 08 Feb 2021 | Published: 18 Jun 2018

TechTarget ComputerWeekly.com

Key software development trends to drive business success
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, you will learn more about leveraging DevOps to automate processes between development and IT teams, the importance of testing to keep internet of things devices safe from prying eyes and how one company has made use of open source software to automate the roll-out of application changes.
Posted: 08 Feb 2021 | Published: 09 Oct 2017

TechTarget ComputerWeekly.com

Application security: More important than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 08 Feb 2021 | Published: 11 Jun 2018

TechTarget ComputerWeekly.com

Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.
Posted: 08 Feb 2021 | Published: 24 Nov 2020

TechTarget ComputerWeekly.com

Why DevOps + Security = A Bright Idea
sponsored by TechTarget Security
EBOOK: By combining DevOps and security, software developers will be able to produce more secure applications and infrastructures and defeat the long-standing bias that security is an obstacle, not aid, to good software development.
Posted: 22 Nov 2016 | Published: 18 Nov 2016

TechTarget Security

How to Resolve a Web Application Security Vulnerability
sponsored by Veracode, Inc.
EGUIDE: Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

It's time to tackle IoT security
sponsored by RUCKUS Networks
EGUIDE: The forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.
Posted: 09 Mar 2016 | Published: 07 Mar 2016

RUCKUS Networks

How to Recognize and Prevent Mobile Security Threats
sponsored by Microsoft
EGUIDE: Learn how to recognize and prevent mobile security threats for application development and deployment, all while discovering how to not fall victim to the 2 most common mobility challenges.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Microsoft

How to Increase Security for your Login on Mobile Applications
sponsored by IBM
EGUIDE: In this expert e-guide, learn techniques to improve security for your mobile login information and messaging applications to help stop unauthorized users from accessing your personal data.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

Building an Application Security Program: Why Education is Key
sponsored by tCell
EGUIDE: Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell