Skip to main content

Ressources

Buyers guide

Future-proof your development: The SAST/SCA buyer’s guide for the AI era

Lire le rapport
Type
Sujet

Affichage 25 - 36 sur 277 ressources

Article

Software Development Life Cycle (SDLC): Phases and Methodologies

Learn more about SDLC (Software Development Life Cycle) phases and methodologies that define the entire software development procedure step-by-step.

Article

What is CI/CD? CI/CD pipeline and tools explained

Learn more about CI/CD continuous integration and continuous delivery, CI/CD pipeline, and framework. CI/CD as the foundation for DevSecOps.

Article

Outil d’analyse des vulnérabilités : présentation et fonctionnement

Découvrez les outils d’analyse des vulnérabilités : types, catégories, fonctionnement et méthode pour choisir le meilleur en 2023.

Article

Vulnerability Assessment: Tools and Steps to Improve Security Posture

Learn more about vulnerability assessment to stay secure and efficiently evaluate the state of security weaknesses and flaws in your systems and environments.

Article

Guide complet de la sécurité des applications

La sécurité des applications est l’ensemble des mesures prises pendant le cycle de vie du développement d’une application pour réduire les vulnérabilités, améliorer la sécurité et protéger les données sensibles.

Article

Sécurité du cloud - Un maillon incontournable de la cybersécurité

Les fournisseurs de clouds publics donnent la priorité à la sécurité, car leur modèle économique leur impose de conserver la confiance du grand public. Pour autant, le cloud signe aussi la disparition du périmètre de l’infrastructure informatique sur site traditionnelle.

Article

Security Champions Overview

Security champions are developers with an interest in security and a home in development. They are the interface between two teams that have traditionally been siloed. Let’s take a look at some of the benefits any organization can gain from these programs.

Article

Product Security vs. Application Security: What’s the Difference?

Discover the differences between product and application security to build more secure products and applications.

Article

Présentation de la gestion de la posture de sécurité dans le cloud

Lors de leur migration vers le cloud, de nombreuses entreprises partent du principe que leur fournisseur, qu’il s’agisse d’Amazon Web Services (AWS), Google Cloud, Microsoft Azure ou d’un autre, assume la pleine responsabilité de la sécurité du cloud.

Article

Enterprise security: How to stay secure at enterprise scale

Enterprise security is the use of technologies, practices, and processes to protect digital assets, systems, and data from threats and vulnerabilities.

Article

The shared responsibility model for cloud security

Cloud security is a shared responsibility between cloud providers and customers.

Article

SOC 2 Cloud Compliance Guide

What is SOC 2 and why is it important for your organization? Follow our steps to bring your cloud environments into SOC 2 compliance.