IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Multimedia (View All Report Types)
1 - 25 of 90 Matches Previous Page  |  Next Page
Simplify and Mobilize Any Business Workflow Securely by Next Week
sponsored by Citrix and Capriza
WEBCAST: In this webinar, you'll learn what it takes to rapidly design and securely deploy apps for your critical business workflows. View now to gain the opportunity to watch as a customized app is designed and deployed in 10 minutes, without the need for complex APIs or writing code.
Posted: 20 Aug 2015 | Premieres: Sep 22, 2015

Citrix and Capriza

Enterprise MAM Takes Center Stage: The Next Chapter in Mobile Strategy
sponsored by Apperian, Inc.
WEBCAST: In this webcast, Gartner Research Director Chris Silva and Steven Wheat, Chief Information Technology Architect at Emory Healthcare, look at how organizations use mobile application management to securely deliver mobile apps. Tune in now to key into these can't-miss MAM strategies.
Posted: 17 Aug 2015 | Premiered: Aug 17, 2015

Apperian, Inc.

Cloud Collaboration at Its Finest: Trek Bicycle Case Study
sponsored by Microsoft
WEBCAST: This webcast serves as a case study of Trek Bicycle, and examines how Trek uses Microsoft Dynamics and Microsoft Dynamics CRM to support their local sales reps and build relationships with their customers. Click here to see how you can shape your enterprise's future in the cloud.
Posted: 12 Aug 2015 | Premiered: Jul 10, 2014

Microsoft

Mobile Threat Management - Detecting and Preventing App Attacks
sponsored by IBM
WEBCAST: In this brief webcast, you will learn how to detect, analyze, and prevent mobile threats against the enterprise.
Posted: 11 Aug 2015 | Premiered: Jul 29, 2015

IBM

Cloud Travels at the Speed of Your Business
sponsored by IBM
WEBCAST: In this webcast, you will learn about a cloud service platform that will grant cloud visibility to all your organization's enterprise mobile devices. Click here to get the answers to your cloud conundrums, including a service that boasts centrally managed security policies.
Posted: 10 Aug 2015 | Premiered: Aug 10, 2015

IBM

Bolstering Your Mobile Mojo: The State of Enterprise Mobility
sponsored by IBM
WEBCAST: Are you struggling to keep up with your mobile users? This webcast will help you get connected with one enterprise cloud solution for your organization's mobile device management (MDM). Click here to see the benefits of your business working in the cloud.
Posted: 10 Aug 2015 | Premiered: Aug 10, 2015

IBM

Game of Phones: Which Device Will Rule EMM for All?
sponsored by IBM
WEBCAST: With an increase of bring your own device (BYOD) spaces, employees can perform their day-to-day work in a more flexible and productive way. This recorded webcast stacks up the top EMM operating system contenders: Apple's iOS, Android, and Windows. Click here to see which device and OS overcomes its competitors in the battle of EMM supremacy.
Posted: 10 Aug 2015 | Premiered: Aug 10, 2015

IBM

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 30 Jul 2015 | Premiered: Jul 1, 2015

WhiteHat Security

Ray Wang's 6 Requirements for Today's HR Applications
sponsored by Workday
WEBCAST: HR teams want applications to be simple, scalable, and stimulating. IT needs applications to be safe, secure, and sustainable. Access this webcast to hear Ray Wang of Constellation Research point the way to the best of both worlds.
Posted: 10 Jul 2015 | Premiered: Aug 19, 2014

Workday

Unlock Your Customer Identities: Virtualize SQL to Deliver Better Security and Services
sponsored by Radiant Logic, Inc.
WEBCAST: This webinar explains how a common identity service for all constituents can improve security and deliver better services to your customers.
Posted: 25 Jun 2015 | Premiered: Mar 9, 2015

Radiant Logic, Inc.

Federated Access & Identity: The Keys to Securing Healthcare's Cloud
sponsored by Radiant Logic, Inc.
WEBCAST: In this webcast, examine how a federated identity service is the key to securing your cloud environment from the endpoint to the core.
Posted: 24 Jun 2015 | Premiered: Jun 2, 2015

Radiant Logic, Inc.

Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 22 May 2015 | Premiered: May 12, 2015

WhiteHat Security

Anti-Malware Tailored to the Needs of Mobile Devices
sponsored by Malwarebytes Corporation
VIDEO: In this brief video, learn about the capabilities of mobile anti-malware and how a mobile anti-malware program could protect you.
Posted: 06 May 2015 | Premiered: 15 Oct 2013


Web Security: Revenge of the Vuln
sponsored by WhiteHat Security
WEBCAST: Join web security guru Robert "RSnake" Hansen in this webinar for an in-depth explanation of the many vulnerabilities you may not have considered, and discover how you can better protect your new creation. View it now and learn how to stop attacks like Heartbleed, SQL injection, command injection and more.
Posted: 13 Apr 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Detecting Web App Vulnerabilities Before Hackers Do
sponsored by IBM
SOFTWARE DOWNLOAD: View now to learn how a web application analysis tool detects your web app vulnerabilities and compiles them in an easy to read security report to help you remediate faster. View now to learn more.
Posted: 24 Feb 2015 | Premiered: 18 Feb 2015

IBM

Detecting Mobile App Security Gaps
sponsored by IBM
PRODUCT DEMO: Access this resource today for your free download of IBM's Security AppScan Mobile Analyzer to detect any gaps in your app mobile app security.
Posted: 24 Feb 2015 | Premiered: 04 Feb 2015

IBM

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks

Application Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn about new app security tools you can use to vet open source libraries and manage security vulnerabilities.
Posted: 03 Feb 2015 | Premiered: 02 Dec 2014

SearchSecurity.com

What if your App Virtualization Solution Didn't Support Location-Based Security?
sponsored by Dell, Inc. and Intel®
VIDEO: In this video, Brian Madden faces what happens if application virtualization solutions doesn't support location-based security.
Posted: 19 Jan 2015 | Premiered: 19 Jan 2015

Dell, Inc. and Intel®

Closing the Hacker's Open Door: Strengthening Mobile & App Security
sponsored by IBM
WEBCAST: In this webcast, learn how to stop apps with malware signatures before they find their way onto your network.
Posted: 05 Mar 2015 | Premiered: Jan 7, 2015

IBM

Mobile App Security: All You Need to Know
sponsored by Maas360 by IBM
WEBCAST: This webcast helps mobile application developers embed enterprise-grade security in their applications.
Posted: 25 Feb 2015 | Premiered: Feb 25, 2015

Maas360 by IBM

Apps to the Future: Predicting Enterprise Mobility in 2015
sponsored by Maas360 by IBM
WEBCAST: This webcast dives into the future of mobile enterprise apps as Fiberlink's own Director of Marketing, Jonathan Dale, is joined by IDC's VP for mobility research, John Jackson for a discussion on enterprise app predictions in 2015, and to share advice for mobile success in 2015. Read on to learn more.
Posted: 24 Feb 2015 | Premiered: Feb 24, 2015

Maas360 by IBM

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Tesco Uses CA Solutions to Monitor, Manage and Grow Their Business
sponsored by CA Technologies.
WEBCAST: Tesco, a global bank, was looking to implement an easy, customer-friendly authentication manager for their online customers. View this concise video now to find out what benefits Tesco is enjoying with this authentication system, and if a solution like this is right for your company.
Posted: 07 Nov 2014 | Premiered: Nov 7, 2014

CA Technologies.

Overcoming the Challenges of Internal API Programs
sponsored by Intel® Services
WEBCAST: Modernizing legacy applications can be handled gracefully when the right API system is considered from the very beginning. View this webcast now to find out how to overcome cultural obstacles in implementing an internal API program, and how to present the value of having such a program.
Posted: 04 Nov 2014 | Premiered: Nov 4, 2014

Intel® Services
1 - 25 of 90 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement