This webinar focuses on the aspects of Docker and Containers that can help you in the development lifecycle of your applications. By utilizing containers you can save time and simplify your development workflow. The benefits you will learn about range from frictionless onboarding of new developers, consistent environments, saving time in managing workstations and dependencies to quickly adapting to new requirements. You will understand the challenges of developing applications within containers and techniques to overcome them. After this session, you will understand:
- How to utilize containers to speed up your development process and free up resources
- Where to start and how to drive progress on integrating containers into your development workflow
- Challenges you might encounter along the way and techniques to overcome them
- The ways containers will shape how you think about application and infrastructure design
Julian is a Software Engineer, Online Educator, and Container Enthusiast. He automates all the things and containerizes Ruby applications at day. At night he sleeps. In between those times, he is busy climbing, hiking and teaching people about Docker and Containers at LearnDocker.online. His current life goal is to drastically reduce the time he sits per day.
Extend the power of SAP® by creating web and mobile apps 10x faster with Mendix. The platform also features extensive governance and control over projects, collaboration tools that bring biz and IT together as well as one click deployment to SAP Cloud Platform.
Mendix is the only low-code platform that:
• Supports the entire Application Lifecycle.
• Fosters collaboration between Business & IT.
• Facilitates no-code and low-code development for Citizen and Pro Developers.
• Is cloud native and highly scalable out-of-the-box.
• Offers deep and rich integration with SAP products and services.
• Runs on SAP Cloud Platform with 1 click.
• Is Open, Extensible and Secure on all levels.
Try Mendix for Free: https://signup.mendix.com/
Guide to Low-Code Development: https://www.mendix.com/low-code-guide/
Latest News: https://www.mendix.com/blogs/
The rapid rise of the app has left developers, owners and marketers with an onslaught of choice, competition and confusion - not to mention massive opportunity. AppScatter will attempt to demystify the app ecosystem, walking delegates through the key trends behind what's being widely hailed as the '4th Industrial Revolution’.Read more >
Almost every major company uses or builds software containing open-source components today—96% of them, according to a report from Black Duck by Synopsis. The same report revealed that 78% of the apps that were audited had at least one vulnerability, including several that were reported nearly six years ago! Needless to say, not having solid open-source use policies and procedures in place for your developers poses a significant risk to any enterprise.
Black Duck and Pivotal collaborated to deliver a secure and simple user experience for rapidly building and deploying applications so that developers can benefit from the many advantages of using open source in their apps with confidence.
Join Dave Meurer from Black Duck and Kamala Dasika from Pivotal as they discuss:
- Key security concepts you need to know pertaining to cloud-native application development
- How to simplify and automate open-source security management for your applications and reduce license, operational risk, or policy violations
Dave Meurer, Alliances Technical Manager at Black Duck by Synopsys, leads solution development, enablement, and evangelism for Synopsys Software Integrity Group.
Kamala leads GTM with Pivotal Cloud Foundry Technology partners. She has been working at Pivotal since 2013 and has previously held various product or engineering positions at VMware, Tibco, SAP, and Applied Biosystems.
Pivotal Privacy Statement:
BlackDuck Privacy Statement:
IAST, or Interactive Application Security Testing, is an emerging technology that is transforming the way organizations secure their web apps at the speed of DevOps. IAST automatically and continuously scans apps during QA testing to detect security vulnerabilities earlier in the SDLC than traditional DAST or pen testing solutions—when it’s easier, faster, and cheaper to fix them. Using a combination of static and dynamic testing techniques, IAST produces highly accurate and actionable results that can be interpreted directly by the developers responsible for fixing the code.
Join guest speaker and Forrester Principal Analyst, Amy DeMartine and Ofer Maor, Director of Solutions Management at Synopsys, as they unpack the promise of IAST from the perspective of an analyst and a technology provider. Learn about the unique benefits and use cases for IAST, as well as the technology’s limitations and which types of organizations stand to gain the most from it.
Development and operations teams have already come a long way by aligning around the shared goal of delivering stable, high-quality software—quickly. By automating manual processes and building tools into the continuous integration and continuous delivery (CI/CD) pipeline, they’ve increased trust between groups, which is essential as these once-disparate teams tackle critical issues together. In this webinar, you’ll learn how to build a DevSecOps culture in your organization with automated and integrated application security tools and the right training for each team.Read more >
Software development deadlines are getting shorter, business requirements are getting more complex, and cybersecurity threats are becoming more real. CA Veracode is responding to this need for rapid development of secure applications by integrating security solutions directly into application development workflows. Specifically, we make our security scanning solutions available from within customer-selected, industry-leading software development tools, such as CA Agile Central. In this webinar, we will discuss why integrating security into your development pipeline is a necessity in todays ever-changing threat landscape and how different stakeholders can benefit from automating security checks. Finally, we will demonstrate the functionality of the integration between CA Agile Central and CA Veracode and outline how easy it is to implement this integration.Read more >
To achieve rapid time-to-market, businesses have embraced DevOps, which places a premium on speed and efficiency. But speed is not the only measure of DevOps success. To release better software faster, enterprises must optimize testing strategy and embed a culture of quality within their DevOps processes.
In this webinar, you will learn:
- How BDD can transform QA from a bottleneck to a speed enabler
- How to integrate quality and increase visibility throughout the SDLC
- How to help your VPs and Directors gauge the success of their current quality initiatives
Can one tool do it all?
Applications are the #1 attack target of hackers, so application security should be an integral part of your software development tools and processes. At the same time, it's more difficult than ever before to pick an AppSec solution. It's easy to find yourself lost in sea of confusing 3 and four-letter acronyms. SAST, DAST, SCA, IAST, PEN, RASP - How do you know which one or ones to choose? In this webinar, we'll try to help simplify things to help you understand the strengths, weaknesses, and applicability of each of these approaches so you can build out your AppSec toolbox with confidence.
As organizations move past the hype surrounding digital transformation, they face the complex realities of implementation, from introducing new digital technologies and applications to adapting or replacing core systems, infrastructure, and processes. Enterprise application development has shifted toward a modern development model that rewards speed, flexibility, and open collaboration.
Watch this webinar to examine why traditional application development methodologies, platforms, and underlying architectures are not sustainable in a competitive environment defined by continuous, rapid change. We'll cover:
- Why apps are more relevant than ever today and why you should modernize
- The architecture, process, platform model of modern application development
- Use cases of the role of new technologies and approaches in application development
- Modernizing applications the Red Hat® way
The security industry has made great strides developing tools and technology to integrate software security into the application development life cycle. However, it’s important not to ignore the people and process aspects of DevSecOps. Building security into application teams’ culture is necessary for DevSecOps to be successful.
Outside the software security group, Security Champions are the leaders of this cultural change. Embedding knowledgeable champions within development teams to assist with security activities and vulnerability remediation will help your organization see this cultural shift. As a result, you’ll build new features not only faster but also more securely. In this webinar, you’ll learn the foundations of a successful Security Champions program and the challenges you’ll face implementing such a program.
Almost every Enterprise is in the middle of digital transformation wave spanning across the landscape of social media, mobility, Analytics and Cloud. However, Enterprises have a big challenge in managing the digital applications built across this landscape comprising of both custom built and out of box solutions. While the number of applications grows rapidly there is also an increasing demand from the business which puts Enterprise IT under constant pressure to improve their agility and provide faster response times to meet market demands. Therefore, Enterprises are in dire need of a solution to simplify the development and management of digital applications with little to no operational overhead.
In this webinar, we will be focusing on how to address the challenges of managing multiple digital applications and bring in standardization in the way they are built and managed.
Join the webinar and learn how effectively you can improve business agility and achieve faster time to market through simplifying management of Digital Applications.
•Challenges in managing diversified applications
•Features of a Digital Management Platform
•Building blocks for rapid development of new digital applications
•Digital Management Journey of a Fortune 400 company
Today, open source comprises a critical component of software code in the average application, yet most organizations lack the visibility into and control of the open source they’re using. A 2016 analysis of 200 commercial applications showed that 67% contained known open source vulnerabilities. Whether it’s a SaaS solution you deliver to millions of customers, or an internal application developed for employees, addressing the open source visibility and control challenges is vital to ensuring proper software security.
Open source use is ubiquitous worldwide. It powers your mobile phone and your company’s most important cloud application. Securing mission critical applications must evolve to address open source as part of software security, complementing and extending the testing of in-house written code.
In this webinar by Cigital and Black Duck security experts, you’ll learn:
- The current state of application security management within the Software Development Lifecycle (SDLC)
- New security considerations organizations face in testing applications that combine open source and in-house written software.
- Steps you can take to automate and manage open source security as part of application development
Software is increasingly the lifeblood of every organization. We are faced with managing the rapid proliferation of web applications and services on which they rely to run their business. The mainstream nature of APIs, standalone and behind web apps, and DevSecOps practices are dramatically changing the potential attack surface for hackers and other threats.
Watch this webinar to hear more about these trends and assess how you need to work within your organization to ensure the security of your application. Specific topics to be discussed include:
•Single Page App-ish (SPA) Architecture to rule enterprise web apps
•Rise of DevSecOps and how its practices demand even faster performance and security testing cycles
•Standalone APIs are valuable attack surface for hackers
This session will be led by Katy Anton - Senior Application Security Consultant @ Veracode, OWASP Bristol Chapter Leader & Project Co-Leader for OWASP Proactive Controls Project. Katy will take the audience through the ins and outs of the OWASP Top 10.
As software becomes increasingly complex, the difficulty of achieving application security increases. With the rapid pace of modern software development processes, securing the software from the beginning can be challenging.
-How can developers write more secure applications?
-What are the security techniques they could use while writing their software?
These are hard questions, as evidenced by the increased cyber breaches. This session will explore the OWASP Top 10 (2017) and will identify the security controls that can prevent these vulnerabilities in which developers can use in the software development lifecycle. By the end of the webinar, you will have an arsenal of security controls that you can start using and apply them while writing your software applications.
Register to this session to find out how the OWASP Top 10 can secure your DevSecOps Initiative!
Going paperless not only helps with the environment but also saves time, money and improves security. WL Bank, a specialist for real estate financing, shares its journey of going paperless for critical decision making process.
David Schenke, Application Development Manager of WL Bank, will discuss:
•How process automation improves decision making
•How mobility empowers stakeholders to be agile and responsive
•How WL Bank is transforming to a paperless organization
Who should attend: Digital Technology Leaders, Application Development Leaders, IT and Business Process Professionals.
Open source software is embraced by developers, enterprises, and governments at every level, and with it comes many strong opinions and few facts. How much open source is really being used in the applications you buy? Does the "many eyes" theory make open source more secure? Does traditional security testing address vulnerabilities in open source?
With organizations becoming more agile but facing increasing regulatory governance, understanding how open source software development works, and how to secure open source, is increasingly important. In this session we’ll cover:
- Code contribution and IP management
- Fork management
- Release process
- Security response processes
- Realities of IP risk and open source
- Pass through security risk and responsibility
- Keeping up with scope of impact changes within a single disclosure
- Automating awareness of security risk from development through integration and delivery to deployment
Open source management is a key part of any application security toolkit. But with so many different tools and techniques on the market, how can you decide what other tools you need to fully address the security risks of your applications? In this webinar, you’ll learn the benefits and limitations of several application security tools, including SAST, SCA, DAST, IAST, and fuzzing, as well as how they differ, so you can make informed decisions as you build your AppSec toolkit.Read more >
Open source components are the foundation of modern applications, but ineffective management around open source can lead to serious risks and unwanted media attention when security flaws lead to data breaches. The Black Duck by Synopsys 2018 Open Source Security and Risk Analysis (OSSRA) examines the previous year’s open source and security news and analyzes trends based on the audits of more than 1,100 codebases.
Not surprisingly, 96% of the audited codebases contained open source components, and nearly 78% of the codebases contained at least one vulnerability. As the percentage of open source in codebases continues to grow, it’s clear that open source management practices need to improve.
In this webinar, open source expert Evan Klein will walk through the report’s findings in depth and discuss strategies companies can use to minimize open source security risk while maximizing the benefits open source provides.
A third party independent study was recently conducted to uncover just how much time AD&D teams can save by using a RAD Platform. During this webinar, we’ll not only share the results of the survey, we will also explain how to determine if RAD platforms are right for your organization. What the webinar will cover:
Average amount of time savings RAD platforms offer vs traditional approaches
Key needs and objectives for considering RAD platforms
Five keys to success when choosing a RAD platform
Application security is quickly becoming a "must have" for security teams. High profile breaches, including Equifax and a multitude of ransomware attacks, have the attention of senior management of company Boards. Knowing where to start can be difficult.
Not every company has the same needs or organizational maturity to manage a full-blown application security program. This webinar will cover some of the tools and exercises deployed by application security teams to build security into their processes, including:
- Tools and security tips for each phase of the development lifecycle
- Which tools to use for different types of code
- In-house and 3rd party options for starting an application security program
If you have a hard time simply clearing out application backlogs, how will you be able to innovate and meet demand for new, modern apps?
The secret lies in Rapid Application Development and Delivery. Join OutSystems and Georgia Tech to hear about their transition from extensive hard coding to rapidly delivering highly scalable critical apps. How rapid? Attend the webinar and find out (hint – it’s not months or years).
DevOps has become a competitive advantage for organizations competing in the new digital era. Increased speed, rapid experimentation, and continuous change are now guiding operating tenants to win in this market. Unfortunately, cybersecurity has been largely absent in the DevOps conversation despite the growing risks and high profile breaches over the past several years. Cybersecurity must adapt to DevOps, not the other way around, to overcome challenges relating to speed, poor visibility, and limited resources.
Join Tenable as we talk about new approaches to secure applications across the entire software development lifecycle with specific examples along the way.
The accelerating pace of change driven by cloud, mobile and big data requires application delivery pipelines to be faster and more agile than ever. IT teams that rely on traditional methods alone find that they’re unable to keep pace with demand, resulting in growing backlogs and missed opportunities.
Join this webinar to see how HP Helion Development Platform is enhanced with visual, model-driven app development by Mendix for HP Helion. Learn best practices for cloud-native rapid app development and how Mendix enables agile app development for 6-10 times faster results than traditional methods. We’ll take you through the complete application lifecycle—from visual design and development to one-click deployment and auto-scaling—and show you how to get started with these powerful capabilities.