IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security White Papers (View All Report Types)
1 - 25 of 408 Matches Previous Page  |  Next Page
When Playing Pokémon Go, Employees Expose Sensitive Corporate Data
sponsored by Cisco Cloudlock
WHITE PAPER: 44% of employees signed into the popular mobile app Pokemon Go using corporate credentials, creating huge security problems. Click inside to learn how implementing a specific application use policy can help minimize the risks apps like this pose, and more.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Cisco Cloudlock

Your Guide to HIPAA Compliance for Containers
sponsored by Twistlock, Inc.
WHITE PAPER: With the advent of microservices it is likely that many new healthcare apps are being built with containers. Discover how to achieve compliance with the HIPAA Security Rule for containerized workloads for healthcare apps.
Posted: 20 Jul 2017 | Published: 20 Jul 2017


Total Cost of Ownership of the CloudBees Jenkins Platform
sponsored by Cloudbees
WHITE PAPER: Explore how to augment open source Jenkins software with CloudBees and foster DevOps practices within your organization. Learn more about the CloudBees Jenkins Platform, how it replaces the manual aspects of running Jenkins with automation, and the platform's total cost of ownership.
Posted: 18 Jul 2017 | Published: 31 Dec 2016

Cloudbees

Using the Pipeline Plugin to Accelerate Continuous Delivery
sponsored by Cloudbees
WHITE PAPER: Uncover an introduction and step-by-step guide for using the Jenkins Pipeline plugin to automate the software lifecycle and achieve continuous delivery. Access tips for everything from installing and creating a pipeline to scaling and securing it.
Posted: 18 Jul 2017 | Published: 31 Dec 2016

Cloudbees

How to Secure Your Organization's Data in SaaS Apps
sponsored by OneLogin
WHITE PAPER: According to Cisco, IT departments are only aware of about 7% of their company's cloud app usage, leading to a massive security blind spot. Discover 10 steps on how to track sensitive corporate data in third-party SaaS apps and ensure that only the right people have the right level of access to it.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

IAM Case Study: How to Maximize Your ROI and Security
sponsored by OneLogin
WHITE PAPER: Security and ROI don't have to be antagonistic. Learn how one company achieved a 482% ROI with their IAM over the course of three years, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

8 Best Practices to Ensure Compliance When Adopting Cloud Apps and Services
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Mitigating the risk shadow IT poses to your company is essential to ensuring compliance when adopting cloud apps and services. Discover 8 best practices that can help you avoid remediation costs, compliance fines, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

Symantec & Blue Coat Systems

Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: Take a deeper look at the history of malware attacks and potential countermeasures to thwart new ones. Also uncover 3 major challenges of file share attacks, recommendations to overcome these challenges, and more.
Posted: 12 Jul 2017 | Published: 31 Dec 2016

BlackBerry

Become An IT Hero: Giving your team the flexibility they want and the security they need
sponsored by Box
WHITE PAPER: In the modern-day workplace, it's become more common for the lines to blur between which apps and tools are appropriate for business collaboration. Learn why using cloud content management can help to improve employee collaboration methods
Posted: 12 Jul 2017 | Published: 12 Jul 2017

Box

Securing Application Traffic on AWS
sponsored by F5 Networks
WHITE PAPER: Securing your applications should be on the top of your to-do list. Read on to learn how to secure your application traffic on AWS by focusing your strategy on three key areas.
Posted: 10 Jul 2017 | Published: 10 Jul 2017

F5 Networks

Reduce App Risk During Mergers and Acquisitions
sponsored by Flexera Software
WHITE PAPER: With the prevalence of open source software in app code nowadays, organizations must be vigilant if they wish to mitigate the risk associated with it during a merger or acquisition. Learn how to ensure that your enterprise isn't at risk of financial and legal pitfalls during mergers and acquisitions stemming from non-compliant software code.
Posted: 06 Jul 2017 | Published: 06 Jul 2017

Flexera Software

Deploying Java EE apps in cloud and container environments
sponsored by Red Hat
WHITE PAPER: Competitive companies are turning to DevOps, microservices, and containers to get the most from their Java apps. In this white paper, learn about Red Hat's fully-certified Java EE 7 application platform and how it was designed to be flexible enough to manage all these emerging priorities.
Posted: 05 Jul 2017 | Published: 05 Jul 2017

Red Hat

Cybersecurity in the Age of Agile, DevOps, and AppDev
sponsored by Veracode, Inc.
WHITE PAPER: With cybersecurity becoming a chief issue among enterprises with high-profile attacks like WannaCry in the news, many enterprises are looking to shore up their defenses and mitigate vulnerabilities. Discover why app security (AppSec) is one of the leading issues.
Posted: 27 Jun 2017 | Published: 27 Jun 2017

Veracode, Inc.

Accelerate App Development with a Lifecycle of Service and Support
sponsored by Getronics
WHITE PAPER: When it comes to managing apps, every organization has the same goals: to drive down cost and complexity, to stop paying for licenses that are never used, to accelerate the provision of new apps without compromising security, etc. Discover how app services help you engineer new apps, re-platform for mobile, and more.
Posted: 26 Jun 2017 | Published: 26 Jun 2017

Getronics

The Spectrum of Mobile Risk: Understanding the Full Range of Risks to Enterprise Data From Mobility
sponsored by Lookout
WHITE PAPER: Download this white paper to discover a mobile risk matrix that will help organizations understand the prevalence of mobile risk surrounding software vulnerabilities, mobile app threats, behavior and configurations and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Lookout

The Internet of Things: Posing Security Threats and Delivering Beyond Expectations
sponsored by Aruba Networks
WHITE PAPER: Not only are many early adopters struggling to secure IoT devices and apps, but many organizations disagree on what IoT means and how to extract value from it. Discover how different industries define, use, and benefit from IoT by creating "smart workplaces," increasing innovation, enhancing customer experiences, and more.
Posted: 23 Jun 2017 | Published: 31 Mar 2017

Aruba Networks

Cost Savings and ROI Enabled by IBM API Connect
sponsored by IBM
WHITE PAPER: The following study conducted by Forrester consulting provides a framework to evaluate the potential financial impact of IBM API Connect on developing new opportunities for developers. Learn how 32 IBM users fared with accelerating development and time to market.
Posted: 21 Jun 2017 | Published: 28 Feb 2017

IBM

An App - Centric Approach to Mobile Security in Healthcare
sponsored by Blue Cedar
WHITE PAPER: In this brief white paper, learn about a new mobile security suite that makes protecting your devices as simple as downloading one application.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Blue Cedar

Software Asset Management: Critical for Mitigating Non-Compliance Risks
sponsored by Flexera Software
WHITE PAPER: This IDC white paper defines software asset management and emphasizes the factors driving its importance. Uncover best practices for mitigating the risks of inefficient software portfolio management and addressing 3 key priorities, namely app security, cost management, and quality of service.
Posted: 16 Jun 2017 | Published: 28 Feb 2017

Flexera Software

11 Policies to Keep Your Apps Secure
sponsored by Blue Cedar
WHITE PAPER: This white paper outlines a suite of app platform policies to help you secure your applications and govern who has access to them, including certificate management, network integration control, secure microtunnels to application's back-end service, and more.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Blue Cedar

The App is the Endpoint
sponsored by Blue Cedar
WHITE PAPER: Uncover 5 fundamental reasons why security leaders are moving away from a device management paradigm and instead are focusing on treating the app as the endpoint.
Posted: 14 Jun 2017 | Published: 31 Dec 2016

Blue Cedar

Application Security Buyers Guide: 15 Requirements
sponsored by Rapid7
WHITE PAPER: In this white paper, learn the 15 elements you need to make sure an application scanning vendor has before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017


7 Questions to Ask Your Dynamic Application Security Scanning Vendor
sponsored by Rapid7
WHITE PAPER: In this white paper, learn 7 questions you should ask any application security vendor about their dynamic application security testing (DAST) capabilities before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017


When Software Goes Rogue
sponsored by BDNA
WHITE PAPER: How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.
Posted: 02 Jun 2017 | Published: 31 May 2017

BDNA

8 Steps to Building Great Mobile Apps
sponsored by Salesforce
WHITE PAPER: Delivering the next generation of apps requires solid strategy, design, and execution at every step. This e-book is your guide to the eight key steps for building a mobile app. Learn about the anatomy of a successful mobile app, how they are evolving, and ensure your apps can be continuously upgraded for future success.
Posted: 01 Jun 2017 | Published: 01 Jun 2017

Salesforce
1 - 25 of 408 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement