IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security White Papers (View All Report Types)
101 - 125 of 485 Matches Previous Page  |  Next Page
Secure and Manage Open Source Software
sponsored by Black Duck Software
WHITE PAPER: This resource reviews a process called, "Open Source Hygiene," which keeps software stacks and application portfolios free of known-exploitable versions of open source code.
Posted: 23 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Open source: What developers and security pros need to know
sponsored by Black Duck Software
WHITE PAPER: Whether you're a developer or security professional, get a firm grip on open source software management, compliance and security risks and solutions you need to know to keep your company safeguarded.
Posted: 22 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Think You Have Application Security Covered? Think again.
sponsored by Black Duck Software
WHITE PAPER: Access this white paper and learn about some of the complications developers have when dealing with open source application development.
Posted: 17 Feb 2016 | Published: 27 Jan 2016

Black Duck Software

Know Your Open Source Code Security is Enhanced by Better Visibility into Code Acquired from Multiple Sources
sponsored by Black Duck Software
WHITE PAPER: This white paper shows you the benefits and shortcomings of open source code and how to deal with any problems you might face when developing with it.
Posted: 16 Feb 2016 | Published: 27 Jan 2016

Black Duck Software

What Executives Need to Know About Security Testing Tools and Open Source
sponsored by Black Duck Software
WHITE PAPER: This white paper teaches you how to utilize open source code without accruing potential risks involved in it.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Application Security in 2016: A Comprehensive Overview
sponsored by Black Duck Software
WHITE PAPER: In this white paper, you will read about key open source application security challenges that your business will face in 2016. Learn how CISO's can address and manage those challenges effectively.
Posted: 15 Feb 2016 | Published: 27 Jan 2016

Black Duck Software

There's More to Backing Up VMs Than Meets the Eye
sponsored by Veeam Software
WHITE PAPER: This whitepaper highlights a built-in infrastructure for application backups that can enable the full backups of virtual environments. Read on to see how this infrastructure, combined with Veeam's backup and recovery solutions, can provide your virtual environments with a wide array of backup, recovery, and replication functionalities.
Posted: 12 Feb 2016 | Published: 12 Feb 2016

Veeam Software

Choosing an Online Backup Tool: Why Speed Should Be a Key Consideration
sponsored by LogicNow
WHITE PAPER: This whitepaper explores an online backup solution that speeds up the process of identifying what files have been changed so that backup windows can focus on actual backups, making them faster and more efficient. Read on to see how this solution can allow your enterprise to eliminate the hassle of slow backups.
Posted: 12 Feb 2016 | Published: 31 Dec 2015

LogicNow

10 Features Every Web App Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This paper explains in detail the 10 features that every Web application firewall must provide.
Posted: 11 Feb 2016 | Published: 30 Dec 2015

Imperva

The Industrialization of Hacking: How to Stop Automated Attacks
sponsored by Imperva
WHITE PAPER: View this infographic and learn how you can better defend against such advanced Web-based attacks.
Posted: 11 Feb 2016 | Published: 30 Dec 2015

Imperva

The Cloud App Visibility Blindspot
sponsored by Imperva
WHITE PAPER: Learn about the visibility blind spot when adopting SaaS apps and the increased risks organizations face with employee use of "Shadow IT."
Posted: 11 Feb 2016 | Published: 16 Sep 2015

Imperva

The State of App Security
sponsored by MobileIron
WHITE PAPER: In this white paper, learn how to proactively approach mobile app security. Explore the features one mobile security option provides, including automated responses to threats like malware, integration to make existing security stack mobile-aware, and more.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

MobileIron

How Mobile Malware Compromises Your Secure Containers and Enterprise Content
sponsored by Checkpoint Software Technologies
WHITE PAPER: In this white paper, you will learn how mobile malware could compromise your secure containers and enterprise content.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Checkpoint Software Technologies

Checkpoint: Demystifying Mobile Security Attacks
sponsored by Checkpoint Software Technologies
WHITE PAPER: In the following white paper, you will examine some of the most common mobile attacks, and moreover demystify how the attacks work and the damage they can cause.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Checkpoint Software Technologies

Defense-In-Depth: Database Securing
sponsored by Oracle Corporation
WHITE PAPER: Today, a DBA can leave work with terabytes of information easily. In this technical primer, you'll find details on ways to control access for your authorized users. Uncover strategies for data theft, SQL injection, and noncompliance prevention.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

Oracle Corporation

Your Guide to Database Firewall Strategies
sponsored by Oracle Corporation
WHITE PAPER: Uncover comprehensive and flexible database, operating system, and application monitoring strategies. Learn how database firewall tools can act as a first line of defense for your network, help prevent SQL injection, and much more.
Posted: 10 Feb 2016 | Published: 30 Apr 2014

Oracle Corporation

How to assess your applications' security vulnerabilities
sponsored by Black Duck Software
WHITE PAPER: Discover how to triage the most critical open source security threats inside with this 4 step guide.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

How Peer-to-Peer File Sharing Impacts Vendor Risk and Security Benchmarking
sponsored by BitSight
WHITE PAPER: File sharing is a prevalent problem on corporate networks today. Access this report and you will learn which industries excel in mitigating the risks of file sharing, how P2P file sharing activity impacts security ratings and more.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

BitSight

XenApp vs. Horizon: Comparing 10 Features
sponsored by Citrix
WHITE PAPER: In this white paper, you will discover the best-in-class features of one application virtualization platform, and compare its features to market equivalents. Read on to ensure virtualization solutions deliver rich experience for your users and comply with security regulations.
Posted: 02 Feb 2016 | Published: 31 Aug 2015

Citrix

5 Steps to Achieve Risk-based Application Security Management
sponsored by IBM
WHITE PAPER: This e-guide discusses potential obstacles to managing application security effectively and describes 5 steps for implementing risk-based application security management. Access now and obtain visibility into the state of application security across your enterprise with these tips.
Posted: 29 Jan 2016 | Published: 31 Jul 2015

IBM

Higher Education Network Security: Satisfying Today's Bandwidth-Hungry Students
sponsored by Fortinet, Inc.
WHITE PAPER: This resource presents a strategy that helped a leading higher education institution protect their network without slowing it down or affecting availability. Learn about benefits like in-depth visibility and reporting of network activities, identity-centric authentication for device security, and much more.
Posted: 17 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

Secure Wireless LAN for Uninterrupted Clinical Applications
sponsored by Fortinet, Inc.
WHITE PAPER: This resource presents a solution that addresses the security and performance requirements for uninterrupted clinical applications, with the least amount of administrative complexity.
Posted: 16 Feb 2016 | Published: 29 Jul 2015

Fortinet, Inc.

Secure Wi-Fi for K-12 Education
sponsored by Fortinet, Inc.
WHITE PAPER: Mobile devices present new security challenges for schools that need to protect their network integrity as well as restrict students' access to dangerous sites. Access this resource to learn about a solution that unifies network and application security and delivers maximum control at a low cost.
Posted: 16 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

Solution Brief: Satisfying Today's Bandwidth Hungry Consumers
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights a high performance next generation firewall solution that protects information and applications without slowing down your network or affecting availability. Read on to see how this firewall solution can provide your enterprise with in-depth visibility and reporting, highly effective intrusion prevention system, and more.
Posted: 12 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

Drive Security, Efficiency and Performance with ADCs
sponsored by A10 Networks
WHITE PAPER: This white paper is designed to lay out the ROI for ADCs. Uncover ways ADC solutions can be used to increase efficiencies in your infrastructure to significantly reduce your expenses, all the while increasing your competitive advantage.
Posted: 11 Feb 2016 | Published: 31 Dec 2015

A10 Networks
101 - 125 of 485 Matches Previous Page    3 4 5 6 7 8    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement