Webinars

AVAILABLE NOW

Declarative pipelines provide a more modern, opinionated approach to pipeline creation and management. But what are they really? What benefit do they bring to your CI/CD processes?

Our three expert panelists discussed:

  • What declarative pipelines are and how they are used
  • Where they are most useful
  • Best practices around creating declarative pipelines in Jenkins

Watch the webinar on demand any time!

Webinars

AVAILABLE NOW

Spring Boot is a common framework for building Spring-based applications. But all frameworks have their risks, and Spring Boot is no exception. Recently, zero day vulnerabilities in the Spring Framework and Spring Boot have created increased demand for security for Spring Boot.

For example, Spring Boot was recently impacted by the SpringShell vulnerability that affected the data binding mechanism and made many applications vulnerable.

Watch this webinar at any time to learn how you can use PreEmptive Dash0 to ensure confidence in the security of your Spring Boot applications.

White Papers

Each year, attacks on mobile applications steadily increase. The costs to businesses in terms of lost customers, compensation, reputation damage, and regulatory fines make lax mobile app security a significant risk factor. Ensuring effective mobile app security, however, presents a major challenge for many organizations.

Download this mobile app security guide to learn:

  • Why mobile app security important
  • Mobile app security risks and threats
  • OWASP Mobile Top 10 vulnerabilities
  • Top mobile app security best practices

White Papers

Building security maturity in development teams can be approached in stages. Based on Secure Code Warrior’s experience with 400+ organizations, we’ve identified the common practices and traits in three different stages of security maturity – defining, adopting, and scaling.

How security-savvy are your development teams?

White Papers

By assessing and understanding a development team’s security maturity, organizations can formulate a plan, with the right stakeholders, process, and technology to build and support the necessary skills and capabilities.

This whitepaper explores:

  • What is security maturity in development teams, and why is it important?
  • What are the different stages and characteristics of security maturity for development teams?
  • What is needed to build security maturity in development teams?

Webinars

AVAILABLE NOW |

SAST is a vulnerability scanning method that identifies risks early in the CI pipeline or within the IDE. As security moves right, coverage becomes increasingly challenging by implementing security earlier in the development cycle with the use of SAST, SCA & QA  – it automatically reduces the remediation work that can arise later in the cycle.

Because half of web application vulnerabilities are critical or high-risk, this raises an important challenge for developers. Time to remediation for vulnerabilities is over 60 days. Kiuwan can prevent common vulnerabilities through a combination of SAST, SCA & QA. Watch this short webinar to learn more about Kiuwan and how their method and products reduces remediation time and accelerates critical fixes – by doing everything upfront!

White Papers

Welcome to !hooked, Guardsquare’s technical magazine featuring hands-on labs.

In this issue, the labs cover code checksumming, control flow (non-)integrity in Android applications, native library encryption, and encrypting Objective-C selectors.

Dive in, learn about the issues, and work through the solutions in these labs.

White Papers

How do you scale your testing to realize the full value of DevOps? In this session, Ethan Chung, Solutions Architect Manager at Keysight Technologies, will show how to expand testing coverage across complex applications with intelligent automation.

Watch now to learn the basics of automation right through to building sophisticated test cases that integrate with any DevOps pipeline.

Webinars

AVAILABLE NOW

In this webinar, SD Times and Kobiton’s Dev Evangelist Shannon Lee, discuss the value and importance of implementing an automation strategy for mobile in order to maximize business growth, and avoid common troubles when getting started.

Watch this video at your convenience to learn:

  • What is a test automation strategy and why you need one

  • Setting common goals and a test approach

  • Proper ways in executing a test automation strategy

  • Differentiating test cases for Manual vs Automated

  • Choosing the right automation tool

White Papers

So. What IS Service Virtualization? Service virtualization is a key enabler to any test automation project, by providing an effective way to simulate dependent services that are out of your control for testing, by creating stable and predictable test environments. Your test automation will be reliable and accurate.

But there are several different approaches and tools available on the market. What should you look for in a service virtualization solution to make sure that you’re maximizing your return on investment?

Use this guide to help you identify the key features and capabilities needed for your successful deployment and adoption of a service virtualization solution. It’s more important than ever to choose a solution that’s right for you and your organization.

Download this whitepaper for the key capabilities to make your organization successful in today’s testing environments!

White Papers

Did you know that up to 20% of the average software development lifecycle is lost waiting for data?

Test data is hard to procure and a risk to manage, but also a requirement. A method based on secure, real data capture provides the best solution for attaining the data.

Parasoft goes beyond traditional test data management (TDM) by providing secure storage and management of synthetic test data while allowing testers without in-depth domain knowledge to customize the data sets for their needs. Their data simulation approach combines traditional test data extraction with service virtualization.

Simplifying TDM reduces the risk and liability of using production data plus reduces overall project risk and costs. Service virtualization provides additional benefits in capturing this data earlier in the development process.

Read this whitepaper to learn how you can adopt a maintainable process to generate an adequate amount of data while keeping that data safe.

White Papers

As teams, environments, projects, and market pressures increase, so do the administrative tasks associated with maintaining and administering Jenkins, one of the most popular development tools on the planet. Scaling Jenkins usage across a growing enterprise, without affecting the security or stability of its SDLC is challenging, particularly for highly regulated industries.

Since CloudBees is the leading contributor of code commits for Jenkins, and has over a decade in DevOps field experience, they have put together a list of best practices for setting up efficient, secure Jenkins pipelines.

Download the guide today to see what they are!

« Previous PageNext Page »
DMCA.com Protection Status