IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security White Papers (View All Report Types)
1 - 25 of 470 Matches Previous Page  |  Next Page
Simple Steps to Evolving Your Website Security in 2016
sponsored by Symantec
WHITE PAPER: Learn how to enforce total protection against website security threats, given the evolving threat landscape of 2016. Access this paper to view several simple steps used to evolve your coverage, including how to increase trust and simplify code signing.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Symantec

Why Code Signing Is an Essential Website Security Feature
sponsored by Symantec
WHITE PAPER: Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, and also allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Symantec

Neustar DDOS Attacks & Protection Report: North America & EMEA The Continuous Risk to Digital Brands
sponsored by Neustar
WHITE PAPER: This report encapsulates the survey results of 760 managers and directors, CSOs, CIOs, CTOs and others in the security and IT. Its purpose is to learn how companies in North America and the EMEA region (Europe, the Middle East, and Africa) encounter and defend against DDoS attacks.
Posted: 28 Sep 2016 | Published: 31 Dec 2015

Neustar

5 Considerations for Securing Hybrid Clouds
sponsored by Intel Security
WHITE PAPER: This white paper explores both old and new security best practices and how to apply them to cloud-based infrastructures. Discover how to make security as agile as the cloud itself by incorporating best practices as an integrated element of a DevOps methodology.
Posted: 23 Sep 2016 | Published: 31 May 2016

Intel Security

Analysts Reveal how to Secure SaaS
sponsored by Palo Alto Networks
WHITE PAPER: This report illustrates the explosive growth of SaaS applications, and their role in creating significant security challenges for IT teams. Learn how CASB products can help deliver the visibility and granular control you need to protect and secure these apps.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Securing Office 365 Is Easier Than You Think
sponsored by Palo Alto Networks
WHITE PAPER: SaaS security concerns can no longer be ignored: Discover how to safely enable Office 365. Read on to address O365-specific security concerns, including details on how to secure O365 from malware insertion and data loss, gain visibility into SaaS usage, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Securing the Unpatchable
sponsored by Palo Alto Networks
WHITE PAPER: Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Best Practices for Writing Secure iOS and Android Apps
sponsored by Proofpoint, Inc.
WHITE PAPER: As mobile applications grow to reach wider audiences, they become larger targets for cyberattackers. Access this list of 21 mobile security guidelines for developers and security pros when developing Android and iOS mobile apps. Learn how to provide security at every step of the mobile application development and management processes.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Proofpoint, Inc.

Why App Stores Cannot Protect Enterprises from Malware and Dangerous Apps
sponsored by Proofpoint, Inc.
WHITE PAPER: Attackers have adapted to the mobile environment. Discover 18 examples of how curated app stores are failing to protect enterprises from malware and dangerous apps, and cannot provide compliance or privacy protection.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Proofpoint, Inc.

Containerization Alone Cannot Defend Against Dangerous And Malicious Apps
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper learn the myth about containerization on a BYOD device. Discover several security scenarios on app-based breaches including: network profiling apps, VPN hijacking apps, data mining apps, and more.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Proofpoint, Inc.

Allow Your Enterprise Greater Mobile App Security
sponsored by MobileIron
WHITE PAPER: This white paper explains how your enterprise can boost the security of its information across a variety of devices, without putting unnecessary restraints on growth or accessibility. Learn how you can Allow your IT admins disable keyboard options to block unrestricted access, simply track data usage, and more.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

MobileIron

Securing Connected Cars Through Comprehensive Software Testing
sponsored by Synopsys
WHITE PAPER: There is a need for greater software testing and assurance in the automotive industry today. Dig deeper into the vulnerabilities associated with automotive software and learn how to test it before your vehicle roles into the dealership.
Posted: 13 Sep 2016 | Published: 01 Aug 2016


Approaching Office 365 with a New Mobile Security Model
sponsored by MobileIron
WHITE PAPER: Learn how your enterprise can approach securing Office 365 for mobile devices. Discover not only what needs to be done to distribute apps securely, but also protect app data-at-rest, data-in-motion, and more.
Posted: 09 Sep 2016 | Published: 09 Sep 2016

MobileIron

Trends in SAP Cybersecurity
sponsored by IBM
WHITE PAPER: The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 29 Aug 2016 | Published: 01 Feb 2016

IBM

Tolly Test Report: Evaluating a Web Protection Vendor
sponsored by IBM
WHITE PAPER: In this test report, The Tolly Group evaluates a top web protection vendor to see how they stack up in the highly vulnerable web threat landscape. Learn how you can gain flexible risk-based access with strong authentication capabilities while protecting against a wide range of application exploits.
Posted: 29 Aug 2016 | Published: 01 Jun 2016

IBM

Five Signs It’s Time for Mobile Workspace Delivery
sponsored by Citrix
WHITE PAPER: Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.
Posted: 25 Aug 2016 | Published: 29 Jul 2016

Citrix

Threat Report: Exploitation & Cyberattacks on SAP Business Applications
sponsored by Onapsis
WHITE PAPER: Your SAP applications are under attack. Access this in-depth threat report to learn about a specific vulnerability being actively exploited, the types of SAP systems affected, and how you can mitigate this vulnerability to minimize business risk.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

Onapsis

How Hacking Happens in 2016: Account Takeover
sponsored by IMMUNIO, Inc.
WHITE PAPER: Account takeovers are the latest tricks up the sleeves of hackers, and this e-book helps you understand the 4 main techniques that hackers use to target the accounts of your users. Access now to learn how you can prevent account takeover, and even quickly detect compromised accounts.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

IMMUNIO, Inc.

Manage Risk by Protecting Apps, Data and Usage
sponsored by Citrix
WHITE PAPER: When it comes to securing vulnerabilities, especially in apps, there are 5 best practices you can follow. This white paper provides and overview of how to ensure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Citrix

Strategy Guide for Securing the SAP Landscape
sponsored by Onapsis
WHITE PAPER: Your organization should be thinking about how best to protect SAP systems. Learn how to secure SAP by taking a largely application-oriented approach, while also applying network restrictions to underlying network devices and firewalls.
Posted: 24 Aug 2016 | Published: 01 Jun 2016

Onapsis

Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

IBM

Day in the Life of a Security Admin
sponsored by RSA Softcat
WHITE PAPER: It's now easier than ever to allow users full access to all network tools and data with a single username and password combination. Learn how to set precise security requirements for each application for any user, from anywhere, to anything.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Onapsis Research Labs: SAP Systems Security Analysis
sponsored by Onapsis
WHITE PAPER: This Onapsis Research Labs report helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.
Posted: 22 Aug 2016 | Published: 29 Feb 2016

Onapsis

Transform your "Good Backup" to Efficient App Availability And Recovery
sponsored by Dell, Inc.
WHITE PAPER: Discover a data protection solution with recovery options and tools that enable enterprises to achieve optimal application availability and fast restores. This single solution can provide your enterprise with the abilities to centralize data protection and recovery across your environment, recover from public cloud storage providers, and more.
Posted: 22 Aug 2016 | Published: 31 May 2016

Dell, Inc.

Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices
sponsored by Lenovo Software
WHITE PAPER: This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.
Posted: 26 Aug 2016 | Published: 21 Sep 2015

Lenovo Software
1 - 25 of 470 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement