IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security White Papers (View All Report Types)
1 - 25 of 464 Matches Previous Page  |  Next Page
How Quantum Computing Will Change Browser Encryption
sponsored by F5 Networks
WHITE PAPER: This white paper provides insight into how quantum computing will affect the current global encryption standard, the Transport Layer Security (TLS), formerly known as SSL.
Posted: 21 Nov 2017 | Published: 13 Jul 2017

F5 Networks

The Hunt for IoT
sponsored by F5 Networks
WHITE PAPER: 30.6 million IoT brute force attacks were launched from January 1 to June 30 2017. This white paper provides an analysis of data collected pertaining to the rise of thingbots in Europe, specifically focusing on the Mirai and Persirai bots containing destructive malware.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

F5 Networks

The Evolving Risk Landscape
sponsored by F5 Networks
WHITE PAPER: There was nearly a 22% increase in attacks on web applications from 2016 to 2017. While apps have increased productivity, they have also opened the door to unprecedented threats, expanding the risk landscape and putting corporate data at risk. This e-book offers a guide to protecting against web fraud, credential stuffing, ransomware, and phishing.
Posted: 20 Nov 2017 | Published: 20 Nov 2017

F5 Networks

Advanced Threat Prevention for Workloads in AWS
sponsored by AWS - Check Point
WHITE PAPER: Once an organization decides to move to the cloud, the next consideration should be determining which cloud deployment model securely meets the needs of the organization. This white paper provides insight into the challenges of transitioning to the AWS cloud while protecting apps and data.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

AWS - Check Point

Mastering the Endpoint: Organizations Find Value in Integrated Suites
sponsored by McAfee, Inc.
WHITE PAPER: According to Forrester, more than 2/3s of enterprises have had their organization's sensitive data compromised in the past year. This Forrester white paper provides insight into a survey compiled with common tools and strategies for managing endpoint security as well as the efficacy of the strategies.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

McAfee, Inc.

Magic Quadrant for Enterprise Data Loss Prevention
sponsored by McAfee, Inc.
WHITE PAPER: According to Gartner, by 2020, 85% of organizations will implement at least one form of integrated DLP, up from 50% today. This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's DLP products as well as, a market overview.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

McAfee, Inc.

Breaking the Bottlenecks in Your SDLC
sponsored by Blueprint Software
WHITE PAPER: Discover how to apply the principles of Agile throughout the software development lifecycle (SDLC) and to the enterprise as a whole so that you can achieve Agile development at scale.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Blueprint Software

Six Steps to Enabling the Mobile Worker
sponsored by Citrix
WHITE PAPER: Employees demand easy access to apps and data in a consistent environment, on a variety of devices. But it can be difficult for IT to ensure constant data protection, privacy, and compliance across devices. Download this white paper to discover six steps that can lead to a successful mobility initiative.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

Citrix

Busting the Myth of the Malware "Silver Bullet"
sponsored by McAfee, Inc.
WHITE PAPER: Malware is continuing to evolve, and the next generation of it is requiring us to adopt next-level defenses. Unfortunately, there is no "silver bullet" to protect you from the lurking malware-wolf. Access this white paper to learn how to create a layered defense with complimentary tools that work in unison to fight malware threats.
Posted: 16 Nov 2017 | Published: 28 Feb 2017

McAfee, Inc.

Preparing for the New OWASP Top 10 and Beyond
sponsored by F5 Networks
WHITE PAPER: Web app security is difficult and firewalls are not going to be enough. OSWAP has released a list of the 10 most common security concerns you need to address for your web apps. Access this e-book to learn about each of these 10 key web app security concerns and how you can mitigate them.
Posted: 16 Nov 2017 | Published: 31 Oct 2017

F5 Networks

Embracing the Digital Workplace with Unified Endpoint Management (UEM)
sponsored by MicroFocus
WHITE PAPER: Today's workers demand access to data and apps from a variety of devices. But how can your organization meet these demands without compromising security and compliance needs? Download this white paper to discover how the right unified endpoint management (UEM) technology can help.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

MicroFocus

Augmenting security and management of Office 365 with Citrix XenMobile
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how to securely deploy and manage Office 365, protect data at rest on mobile devices and protect data in transit. You'll also learn how to configure mobile apps with hosted Exchange and more.
Posted: 15 Nov 2017 | Published: 15 Nov 2017

Citrix

Growth of the Connected Home
sponsored by TE Connectivity
WHITE PAPER: In this white paper, learn how the connected home is a rapidly emerging market and platform for new IoT devices. Then, gain a stronger understanding of the consumer mindset and the potential benefits and challenges of connected devices in the home.
Posted: 10 Nov 2017 | Published: 10 Nov 2017

TE Connectivity

The Hiker's Guide to Software Security
sponsored by Synopsys
WHITE PAPER: Uncover 7 key considerations for building app security seamlessly into your software development and deployment initiatives.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

Synopsys

A New Way to Look at AWS Security
sponsored by AWS-Cisco
WHITE PAPER: AWS environments that make use of AWS-native services and entity modeling can be protected from known and unknown security threats in a scalable and cost-effective manner. Access this white paper to learn how entity modeling provides a new approach to AWS that ensures security.
Posted: 06 Nov 2017 | Published: 29 Sep 2017

AWS-Cisco

The Agile Security Manifesto
sponsored by Synopsys
WHITE PAPER: Find out how to achieve continuous integration/continuous deployment (CI/CD) safely and securely with the 4 principles of building app security into Agile development.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

Synopsys

Accelerating and Protecting APIs
sponsored by Akamai Technologies
WHITE PAPER: With APIs powering critical websites and apps, read this white paper to learn how you can optimize performance and address API vulnerabilities.
Posted: 02 Nov 2017 | Published: 02 Nov 2017

Akamai Technologies

Your Checklist for a Cloud-Native Development Platform
sponsored by Red Hat
WHITE PAPER: Find out how to evaluate cloud-native app development platforms and access a checklist that will help you choose the one that's best suited for your business.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Red Hat

Vendor Landscape: Vulnerability Management, 2017
sponsored by Tenable, Inc.
WHITE PAPER: According to a Forrester security survey, software vulnerabilities are the leading method of external intrusion in a breach. Explore this Forrester report to learn more about the vulnerability management vendor landscape and security trends that directly affect and enable business operations.
Posted: 30 Oct 2017 | Published: 30 Oct 2017

Tenable, Inc.

5 Risk Points to Avoid in Enterprise Security
sponsored by Microsoft
WHITE PAPER: According to the Verizon Data Breach Investigations Report, nearly 80% of organizations reported data breaches, with 1/3 of them reporting more than 6 breaches. In this white paper, find out how you can boost your organization's device and app security, all while protecting against malware, data breaches and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Microsoft

Why IPS Devices and Firewalls Fail to Stop DDoS Threats
sponsored by Arbor Networks
WHITE PAPER: According to data center respondents of Arbor's Worldwide Infrastructure Security report, 67% have experienced a multi-vector DDoS attack. In addition, 45% of respondents experienced firewall or IPS device failure during an attack. This white paper reveals why IPS devices and firewalls can't stop DDoS attacks.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Arbor Networks

The State of Endpoint Protection & Management
sponsored by Absolute
WHITE PAPER: According to Larry Ponemon of the Ponemon Institute, 67% of enterprises are unable to detect employee use of insecure mobile devices. This white paper aims to answer some of the top questions security and IT operations executives face in regard to endpoint security, mobile security, and overall protection of your enterprise.
Posted: 20 Oct 2017 | Published: 20 Oct 2017

Absolute

The Three Faces Of Insider Threat
sponsored by Absolute
WHITE PAPER: According to IBM, 95% of all security incidents involve human error. Are you prepared for the enemy within? In this white paper, uncover how to protect your organization against insider threats.
Posted: 20 Oct 2017 | Published: 20 Oct 2017

Absolute

The Stakes Have Changed, Have You? 20 Years of DDoS Attacks Targeting Business
sponsored by Arbor Networks
WHITE PAPER: According to the Worldwide Infrastructure Security Report, 93% of survey respondents experienced application layer-attacks and 56% experienced multi-vector DDoS attacks. Inside, learn how DDoS attacks have evolved and changed over time.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

Arbor Networks

Don't Let your Cloud-First Strategy Get Stuck in Traffic
sponsored by Verizon
WHITE PAPER: In this white paper, learn how to overcome SaaS challenges to help build a cloud-first network that fits your business needs.
Posted: 30 Oct 2017 | Published: 30 Oct 2017

Verizon
1 - 25 of 464 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement