Software Security Reports

Jargon Buster Guide to Container Security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.
Posted: 08 Feb 2021 | Published: 19 Feb 2019

TechTarget ComputerWeekly.com

Key software development trends to drive business success
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, you will learn more about leveraging DevOps to automate processes between development and IT teams, the importance of testing to keep internet of things devices safe from prying eyes and how one company has made use of open source software to automate the roll-out of application changes.
Posted: 08 Feb 2021 | Published: 09 Oct 2017

TechTarget ComputerWeekly.com

DevOps: Latest developments & use cases in ASEAN
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the state of DevOps adoption across Southeast Asia, the importance of integrating security into DevOps processes and our top tips for securing management buy-in.
Posted: 08 Feb 2021 | Published: 18 Jun 2018

TechTarget ComputerWeekly.com

Infographic: Vulnerability management vs. Patch management
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Although both patch and vulnerability management are intertwined, they differ in critical ways, and it's important to have tools and processes for executing both. Here's a deep dive into their differences, the important places they overlap and software options for automating them.
Posted: 01 Jul 2022 | Published: 01 Jul 2022

TechTarget ComputerWeekly.com

PERIMETER SECURITY NOISE LEAVES APPLICATIONS VULNERABLE TO ATTACKS
sponsored by Contrast Security
WHITE PAPER: Learn how you can get AppSec protection that can compensate with the necessary visibility, accuracy, scalability, and ease of deployment to keep pace with modern application vulnerabilities without generating false positives and false negatives.
Posted: 08 Feb 2021 | Published: 08 Apr 2020

Contrast Security

Top 10 Australia IT stories of 2018
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this review of the top 10 Computer Weekly articles focused on IT in Australia, we look at what the country is doing to cement its position as a leader in mastering and deploying advanced information and communications technology across a large segment of its economy.
Posted: 08 Feb 2021 | Published: 21 Dec 2018

TechTarget ComputerWeekly.com

Building a Strong Application Security Program
sponsored by Onapsis
EGUIDE: What are the first steps to creating a strong app security program, and how do you know you've struck the right balance between static and dynamic testing? These are the types of questions we explore in this e-guide. Find out what role education is playing in building an app security program and get advice for mitigating SAP vulnerabilities.
Posted: 12 Sep 2016 | Published: 09 Sep 2016

Onapsis

How mobile remote desktop apps work
sponsored by LogMeIn Rescue Lens
EGUIDE: Mobile remote desktop apps can be an important tool for enterprises in keeping up with today's on-the-go workforce. The benefits of greater accessibility mean they could be a strategic fit in a variety of enterprise environments. Learn how to select the right mobile remote desktop products for your business, and how they work.
Posted: 13 Mar 2017 | Published: 10 Mar 2017

LogMeIn Rescue Lens

Infographic: How blockchain works
sponsored by TechTarget ComputerWeekly.com
EGUIDE: To get a solid understanding of how to use blockchain in an enterprise setting, CIOs must first grasp how a unit of value in a transaction moves from party A to party B. This infographic details how blockchain works from transaction initiation, through verification, all the way to delivery.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

TechTarget ComputerWeekly.com

Unifying Endpoint Management with Windows 10
sponsored by VMware
EGUIDE: A key pain point for enterprises using Windows 10 is that you need insight into which devices require updates and which already have them. Read this guide to learn about this new unified endpoint management system to empower your employees while simplifying IT's job.
Posted: 07 Feb 2018 | Published: 05 Feb 2018

VMware