Developing Secure Applications Multimedia

(View All Report Types)
Your guide to container security: Tips and tricks for success
sponsored by Palo Alto Networks
WEBCAST: To ensure you fully understand the container attack surface and to ward off container security risks, tune into the following webcast. Inside, you’ll takeaway 4 containers and Kubernetes security best practices to immediately apply in your organization.
Posted: 01 May 2024 | Premiered: May 1, 2024

Palo Alto Networks

Webcast: How Security is well suited for Agile development
sponsored by IBM
WEBCAST: View this webcast as speakers explore security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and how security is linked to the software development lifecycle.
Posted: 15 Jun 2011 | Premiered: Jun 15, 2011

IBM

Optimize Business and IT With New Generation Application Lifecycle Management
sponsored by SAP Community Network
WEBCAST: This webcast provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
Posted: 15 Sep 2009 | Premiered: Sep 30, 2009, 12:00 EDT (16:00 GMT)

SAP Community Network

End-to-End Secure Client to Cloud Access
sponsored by Intel
WEBCAST: In this session, learn how federated SSO and emerging client strong auth technologies can be combined to secure users and data in flight to the cloud.
Posted: 01 Mar 2011 | Premiered: Mar 1, 2011

Intel

Podcast: How Security is well suited for Agile development
sponsored by IBM
PODCAST: Tune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and why how security is linked to the software development lifecycle.
Posted: 09 Jun 2011 | Premiered: Jun 7, 2011, 13:30 EDT (17:30 GMT)

IBM

Should, Shall, or Must: HIPAA Rules and Their Interpretation
sponsored by IBM
VIDEO: Product Architect at IBM discusses the Interpretation Request process within the HIPAA Implementation Guides.
Posted: 20 Jan 2017 | Premiered: 20 Jan 2017

TOPICS:  IT Management
IBM

Tech Talk: Busting the Malware Silver Bullet Myth
sponsored by McAfee, Inc.
VIDEO: Hear how multiple layers of advanced malware detection and analysis technologies combat cyberthreat innovation.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

Health Insurance Provider Transforms Their Data Platform
sponsored by IBM
VIDEO: James Wade of Florida Blue discusses the solutions that helped reduce hold times and eliminate fraud.
Posted: 06 Apr 2017 | Premiered: 06 Apr 2017

TOPICS:  IT Management
IBM

Reduce Insider Threats Risk Through End User Empowerment
sponsored by McAfee, Inc.
VIDEO: Employees are a giant risk to your most sensitive data. Reduce the risk by educating users on the three best practices.
Posted: 10 May 2017 | Premiered: 10 May 2017

TOPICS:  IT Management
McAfee, Inc.

You Can Get There From Here: The Road to Secure DevOps
sponsored by Veracode, Inc.
WEBCAST: In this webcast, learn a basic understanding of Waterfall, Agile and DevOps from a people, process and technology point of view, how Security can best be integrated into DevOps and more.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

TOPICS:  IT Management
Veracode, Inc.