225 results in Everything
 
Sort by:
Refine
  • Application Security

Search Results

  • Report The Forrester New Wave™: Runtime Application Self-Protection, Q1 2018

    The Eight Providers That Matter Most And How They Stack Up
    March 22, 2018 | Amy DeMartine

    In Forrester's evaluation of the emerging market for runtime application self-protection (RASP), we identified the eight most significant providers — Avocado Systems, CA Veracode, Contrast...

  • Report The State Of Application Security, 2018

    Application Security Is Worsening, But Automation Offers Hope
    January 23, 2018 | Amy DeMartine

    In 2017, applications rolled out the welcome mat to malicious hackers, topping the list of successful external attack targets. Why? Developers continue transitioning from perfect to fast to provide...

  • Report The Forrester Tech Tide™: Identity And Access Management, Q4 2017

    Thirteen Technology Categories Underpin The Identity And Access Management Market
    December 12, 2017 | Andras Cser, Merritt Maxim

    Identity and access management (IAM) is critical to protecting customers from identify theft and privacy abuses, limiting the potential for and impact of a cyberattack, and streamlining numerous...

  • Report The Forrester Wave™: Static Application Security Testing, Q4 2017

    The 10 Vendors That Matter Most And How They Stack Up
    December 12, 2017 | Amy DeMartine

    In our 29-criteria evaluation of the static application security testing (SAST) market, we identified the 10 most significant vendors — CAST, CA Veracode, Checkmarx, IBM, Micro Focus, Parasoft,...

  • Report Construct A Business Case For Interactive Application Security Testing

    How Faster App Releases At Reduced Cost Make IAST Worthwhile
    November 3, 2017 | Amy DeMartine

    As software delivery times speed up, security professionals are trying to fit repeatable security testing into shrinking software delivery life cycles. Rather than depending on a crawler to assess...

  • Webinar Secret Agents: How Secure Are These New Intelligent Agent Interfaces?

    October 12, 2017 | Amy DeMartine

    Early-stage intelligent agents (IAs) have arrived and are gaining traction among consumers. Leaving behind the direct, detailed commands of their interface predecessors, IAs will soon expand their...

  • Report TechRadar™: Data Security And Privacy, Q4 2017

    As data volumes explode, it's becoming a Herculean task to protect sensitive data from cybercriminals and malicious actors while preventing privacy infringements and abuses — intentional and...

  • Report Vendor Landscape: Runtime Application Self-Protection

    Protect Your Imperfect Code Until It Can Be Fixed
    September 29, 2017 | Amy DeMartine

    Even with the best prerelease security testing, developers will never write perfectly secure code. Zero-day attacks will continue to target vulnerable open source components, third-party...

  • Report Secure The Rise Of Intelligent Agents

    Securing Intelligent Agents Will Stress Application Security Basics
    September 14, 2017 | Amy DeMartine, Jennifer Wise

    Early-stage intelligent agents (IAs) have arrived and are gaining traction among consumers. Leaving behind the direct, detailed commands of their virtual assistant predecessors, IAs will soon see...

  • Report Assess The Maturity Of Your Application Security Program

    Know What Application Security Functions To Prioritize, And How
    September 14, 2017 | Amy DeMartine

    Successful attacks on applications continue to prove the ubiquity of software vulnerabilities, and now that applications are releasing faster than ever, the problem will grow much worse if not...

  • Report Vendor Landscape: Application Security Testing

    Choose The Right SAST, DAST, MAST, And IAST For Your Firm's Developers
    August 7, 2017 | Amy DeMartine

    Application releases are getting faster, especially as developers make use of DevOps methodologies to automate releases. Security pros can support and even drive these changes using continuous...

  • Report TechRadar™: Application Security, Q3 2017

    Application Security Solutions Pivot To Meet Application Conditions
    July 6, 2017 | Amy DeMartine

    Applications are increasingly the face of interaction between companies and their customers; this includes customer-facing applications, differentiating mobile apps, internet-of-things (IoT) device...

  • Report Hardcoded For Failure

    Ignoring The Hardware, Firmware, And Code Running Our Networks Guarantees A Cyberattack
    June 21, 2017 | Chase Cunningham

    There is a plethora of security solutions to protect endpoints, mobile devices, and employees, but there is a deeper threat vector security pros often ignore. This threat is built into the very...

Content Type

Apply

Filters

Region

Vendor