Whitepapers

How Application Security fits into the Security Ecosystem

Learn more

Application Security Fallacies and Realities

View the guide

SANS: Why You Need an Application Security Program

Download now

Ultimate Guide to Getting Started with Application Security

Read the guide

Putting Security Into DevOps

Get the whitepaper

Appropriate Software Security Control Types for Third-Party Service and Product Providers

Get the whitepaper

Cybersecurity & Corporate Liability in the Boardroom

Get the whitepaper

Cybersecurity in the Boardroom

Get the whitepaper

2014: The Year of the Application Layer Breach

Get the ebook

The New CISO’s Tool Kit

Download now

Five Steps for Preparing for a Vulnerability Disclosure

Download now

7 Habits of Successful Supply Chain Transformations

Download now

Secure Agile Development

Download now

Evolve To Become the 2018 CISO or Face Extinction

Get the whitepaper

THREAT MODELING: Designing for Security

Get the whitepaper

IDG Study: Why Application Security is a Business Imperative

Get the whitepaper

8 Patterns of Secure Agile Teams

Download now

Addressing the Scalability Challenge with Cloud-Based Application Security

Download now

Hacking Exposed 7 - Chapter 10: Web and Database Hacking

Get the chapter

Serious About Protecting Vendor Intellectual Property

Download now

Secure Software Supply Chain Toolkit

Download Now

Shining a Light on the False Security of 1000s of Mobile Apps

Download now

Forrester CISO Handbook - Presenting to the Board

Download now

Protecting Your Organization from Application Backdoors

Download now

Understanding NIST 800-37 FISMA Requirements

Download now

PCI Guide for Merchants and Service Providers

Download now

Understanding The Risks of Mobile Applications

Download now

Broken Logic: Avoiding the Test Site Fallacy

Download now

Five Best Practices of Vendor Application Security Management

Download now

CISO's Guide to Application Security

Get the whitepaper

SANS Mobile Application Security Survey

Download now

FS-ISAC Third Party Software Security Working Group Recommended Guidance

Download now