IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security White Papers (View All Report Types)
1 - 25 of 427 Matches Previous Page  |  Next Page
Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)
sponsored by CyberArk Software, Inc
WHITE PAPER: Discover why securing and managing privileged accounts should be an integral part of your organization's strategy in achieving SWIFT CSCF compliance.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc

Top 10 AWS Cloud Security Risks and how to Resolve them
sponsored by evident.io
WHITE PAPER: Take a look at this white paper to reveal a security platform that can protect your Amazon Web Services (AWS) cloud.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

evident.io

Digital Documents, Compliance, and the Cloud
sponsored by J2 Cloud Services
WHITE PAPER: This white paper highlights the challenges associated with managing sensitive documents on the cloud while sharing security best practices to reduce transmission managements and retention costs associated with e-documents.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

J2 Cloud Services

Location Services: Bridging the Physical and Digital Divide
sponsored by Aruba Networks
WHITE PAPER: In this white paper, learn how you can take advantages of BLE-based asset tags and BLE-enabled access points to meet the required accuracy and latency demands for enterprise mobile initiatives.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Aruba Networks

eFax Corporate Unmasked: The Top 10 Fax Essential Questions Answered
sponsored by J2 Cloud Services
WHITE PAPER: In this online resource, find the answers for the top 10 questions to asked during eFax Corporate Webinar series over the past year.
Posted: 12 Sep 2017 | Published: 20 Jun 2017

J2 Cloud Services

Stop Password Sprawl with App Single Sign-on
sponsored by Centrify Corporation
WHITE PAPER: In this white paper, learn the key considerations you should ask before investing and deploying a single sign-on vendor to ensure a smooth transition that aligns with security best practices.
Posted: 12 Sep 2017 | Published: 12 Sep 2017

Centrify Corporation

Solving API Performance, Reliability, and Security Challenges
sponsored by Akamai Technologies
WHITE PAPER: In this white paper, find out the top questions you should be asking when you review existing and future APIs.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Akamai Technologies

Achieve security, flexibility and efficiency for your financial services organization with virtualization
sponsored by Citrix
WHITE PAPER: The need for greater security controls from IT without compromising business agility makes it essential for financial services organizations to move beyond traditional desktop management to centralized virtual app delivery. Read this white paper to discover how virtualization can enable faster and more secure access to apps and data.
Posted: 06 Sep 2017 | Published: 06 Sep 2017

Citrix

4 Facts about APIs: The Hidden Technology Powering the Internet
sponsored by Akamai Technologies
WHITE PAPER: In this resource, learn the 4 facts about APIs revealed in a recent survey completed by business leaders from over 400 leading technology companies.
Posted: 06 Sep 2017 | Published: 28 Feb 2017

Akamai Technologies

Does your Company have a Kill Switch?
sponsored by LogMeIn, Inc.
WHITE PAPER: Without a kill switch, there's no way to know you've secured your fortress. Read this white paper to uncover why your company should implement a password manager to protect your team's data.
Posted: 06 Sep 2017 | Published: 06 Sep 2017

LogMeIn, Inc.

Transform the branch office for high-touch, high-performance experiences
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how financial services organizations can optimize and secure the delivery of apps and desktops over any network connection, to any device, to support branch office workers and customer service.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Citrix

Southcoast Health System: A Case Study
sponsored by Citrix
WHITE PAPER: Protecting privacy in a growing, distributed and mobile environment is no easy task. This case study discusses how Southcoast implemented a secure mobile strategy that met diverse clinical, business, and security goals.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Citrix

Case Study: Maintaining Strong Security While Going Mobile
sponsored by Citrix
WHITE PAPER: In order to gain the productivity and cost benefits of going mobile, security needs to be factored in from the beginning. Learn from this case study and see how one healthcare organization used a secure mobility strategy to reduce the risk of potential HIPAA breaches, address request for BYOD support in less than two weeks, and more.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Citrix

Secure app and data delivery for a mobile financial services workforce
sponsored by Citrix
WHITE PAPER: Download this white paper to find out how one company provides a complete digital workspace that delivers secure access to apps, data and services from any device via any network while centralizing apps and data for simplified IT management.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Citrix

Enabling Secure Mobility: Explore 3 Case Studies
sponsored by Citrix
WHITE PAPER: This white paper explores technologies that enable organizations to maintain security, privacy and compliance while evolving their IT environment for mobility.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Citrix

As Learning Hinges On Devices And Applications, Challenges Increase For IT
sponsored by IBM
WHITE PAPER: Explore the importance of putting security measures in place to restrict apps, documents and data to specific users and groups, ensuring sensitive data does not end up in the wrong hands. Learn from the education industry on how endpoint management can help you achieve stronger data security.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

IBM

The Cloud Evolution: Top Security Challenges & How to Overcome Them
sponsored by AWS-Trend Micro
WHITE PAPER: Leverage Deep Security on AWS to adopt a DevSecOps culture, so your IT team can spend less time focusing on security and more developing your core business applications.
Posted: 24 Aug 2017 | Published: 25 Jul 2017

AWS-Trend Micro

Best-of-Breed Enterprise Mac Management
sponsored by JAMF
WHITE PAPER: Download this white paper to discover a full Mac client management tool built to support the underlying architecture of macOS from the ground up, that gives IT administrators the flexibility to gather inventory data in a way that's extendable and customizable, integrated, actionable and auditable.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

JAMF

End of Support Doesn't Have to Mean End of Security
sponsored by TrendMicro
WHITE PAPER: Does end of support mean end of security? Explore the security risks facing organizations running end of life (EOL) platforms like Windows Server 2003. Uncover 5 options to address those risks.
Posted: 11 Aug 2017 | Published: 31 Jul 2017

TrendMicro

Remedying the Email Security Gaps in Microsoft Office 365
sponsored by Mimecast
WHITE PAPER: Discover how to protect your organization from security risks, data loss, and business continuity skills while using Microsoft Office 365.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Mimecast

The Flux7 Enterprise DevOps Framework
sponsored by Flux7
WHITE PAPER: Learning from the experience of other DevOps adopters, discover how to use an enterprise DevOps framework to streamline the delivery of apps and services. Plus, uncover 7 steps for DevOps and digital transformation success.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

Flux7

Effectively Balancing DevSecOps
sponsored by Flux7
WHITE PAPER: As app development becomes more agile, security can get left in the dust – and conversely, if security and testing takes too long, it can decelerate the app lifecycle and impede organizational agility. Learn how to enables DevSecOps with security automation for AWS and cloud-based development environments.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

Flux7

A Buyer's Guide to Cloud Access Security Brokers
sponsored by Cisco Cloudlock
WHITE PAPER: Uncover a detailed examination of CASBs and 7 essential features to look for. Also learn about the current cloud threat landscape, 6 challenges to proxy-based CASB tools, and more.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

Cisco Cloudlock

When Playing Pokémon Go, Employees Expose Sensitive Corporate Data
sponsored by Cisco Cloudlock
WHITE PAPER: 44% of employees signed into the popular mobile app Pokemon Go using corporate credentials, creating huge security problems. Learn how implementing a specific application use policy can help minimize the risks apps like this pose, and more.
Posted: 21 Jul 2017 | Published: 21 Jul 2017

Cisco Cloudlock

Cyber security solutions from IBM
sponsored by IBM
WHITE PAPER: Government agencies rely on the Internet to store large amounts of data. As a result, internal and external threats are a growing concern for personal and valuable information. This informative white paper offers cyber security solutions to ensure protection.
Posted: 28 Aug 2017 | Published: 20 Jul 2012

IBM
1 - 25 of 427 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement