IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security White Papers (View All Report Types)
101 - 125 of 450 Matches Previous Page  |  Next Page
Building the Business Case for Modern Access Management
sponsored by Ping Identity Corporation
WHITE PAPER: Discover the 4 questions you need to consider when building your IAM strategy to protect users, customers, third-parties, and sensitive data.
Posted: 22 Oct 2015 | Published: 07 Oct 2015

Ping Identity Corporation

The State of Mobile Security Maturity
sponsored by IBM
WHITE PAPER: This white paper reviews the blurred lines between personal and professional use of mobile devices as well as the inherent risks enterprise mobility poses to data, apps, and networks.
Posted: 19 Oct 2015 | Published: 31 Dec 2014

IBM

The Current State of Application Delivery in APAC
sponsored by F5 Networks
WHITE PAPER: In the following infographic, you will discover all you need to know about the state of application delivery in APAC in 2015. Discover why organizations are finding that success depends on the effectiveness of their security infrastructure.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

F5 Networks

Mobilephobia: Curing the CISO’s Most Common Mobile Security Fears
sponsored by IBM
WHITE PAPER: Discover the cure to mobilephobia and how to holistically and securely manage the mobile enterprise in this exclusive white paper.
Posted: 02 Oct 2015 | Published: 01 Oct 2015

IBM

Bolster Your Web Application Security
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines how you can give your web applications the security they need, and protect against vulnerabilities or other threats.
Posted: 01 Oct 2015 | Published: 06 Jul 2015

WhiteHat Security

Programmatically Identifying Multi-Page Flaws in Web Apps
sponsored by WhiteHat Security
WHITE PAPER: This white paper details the pros and cons of several web app scanning approaches. View now to test your web apps' functions independently, automatically detect the presence of common nonce frameworks, and more.
Posted: 01 Oct 2015 | Published: 31 Dec 2013

WhiteHat Security

5 Days to Setting Up an Application Security Program
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines a five day guide to bolstering your app security strategy.  Access now to learn more.
Posted: 01 Oct 2015 | Published: 12 Jan 2015

WhiteHat Security

Evaluating the Total Cost of Ownership for Protecting Web Applications
sponsored by WhiteHat Security
WHITE PAPER: This white paper breaks down the total cost of web app security in the three major risk categories associated with successful attacks. Access now to learn how to quantify the costs of web app security compared to the costs of a breach.
Posted: 01 Oct 2015 | Published: 14 Oct 2013

WhiteHat Security

Securing Apps from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 01 Oct 2015 | Published: 28 Oct 2014

WhiteHat Security

Top 5 Cloud Data Protection Challenges. Solved
sponsored by Commvault
WHITE PAPER: This white paper serves as guide with which you can realize the full potential of your next cloud project. Read on to see how the following 5 challenges may impact your cloud integration strategy.
Posted: 28 Sep 2015 | Published: 24 Aug 2015

Commvault

Secure-by-Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.
Posted: 14 Sep 2015 | Published: 22 May 2014

Citrix

Why Application Whitelisting Is Essential For Advanced Threat Defense
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript explores the challenge of securing your endpoints from zero-day attacks and suggests application whitelisting as a solution.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Digital Guardian

Efficiently Develop and Deliver Mobile Apps and Services with the Cloud
sponsored by Oracle Corporation
WHITE PAPER: Mobile app users expect apps to be delivered faster than ever before. Learn how a mobile cloud service can support efficient, high-quality mobile application development. Explore a strategy that can enable you to quickly implement new APIs, leverage analytics to see an app's adoption rate, secure your mobile apps with authentication, and more.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Oracle Corporation

Developing, Deploying, and Monitoring Mobile Apps with the Cloud
sponsored by Oracle Corporation
WHITE PAPER: This white paper explores how you can streamline mobile application development with cloud services. Discover how to extend and secure your mobile apps, connect new mobile apps to existing integration and security services, deploy apps in the cloud while diagnosing performance and usage, and more.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Oracle Corporation

Bolstering Your Enterprise Mobility Security Strategy for Today's App Landscape
sponsored by Oracle Corporation
WHITE PAPER: This quick and easy guide outlines the benefits of employing enterprise mobility management (EMM) in your organization, and also highlights the particular risks facing BYOD users in the mobile app landscape.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Oracle Corporation

Re-Thinking Your Data Flow Transmission for Security Risk and Compliance
sponsored by Axway
WHITE PAPER: In this white paper, discover why it's best to ditch file transfer protocol-based and personal file sync and share tools that increase risk for a data breach. Access now and discover how a managed file transfer approach offers modern, secure data flow transmission.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Axway

Top 10 Reasons MDM is just a Fad
sponsored by IBM
WHITE PAPER: This white paper debunks the top 10 misconceptions about mobile device management and security.
Posted: 16 Jul 2015 | Published: 16 May 2014

IBM

Intro to Mobile App Management: App Security from the Onset
sponsored by IBM
WHITE PAPER: This white paper, the first in an installment of three, explores how to create a successful app security strategy from the beginning.
Posted: 16 Jul 2015 | Published: 24 Jun 2015

IBM

A Foundation for Next-Generation Datacenter and Cloud-Based Security
sponsored by Citrix
WHITE PAPER: Access this white paper to learn how to leverage an application delivery controller to secure your data center and ensure your applications are always available, optimized, and secured.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

Citrix

Secure Content Collaboration on the Go
sponsored by IBM
WHITE PAPER: This white paper discusses the dangers of mobile content sharing and gives advice on what you can do to make it secure.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

IBM

When Business is the App, The App is the Business
sponsored by IBM
WHITE PAPER: This white paper explains how to design a business-driven app strategy that advances business goals without putting enterprise data and your network at risk.
Posted: 15 Jul 2015 | Published: 08 Jul 2015

IBM

How to Make Android Work For Your Enterprise
sponsored by IBM
WHITE PAPER: This white paper walks you through how to customize the Android security and management capabilities to your company's mobile strategy.
Posted: 13 Jul 2015 | Published: 13 Jul 2015

IBM

The Top 6 Tools Users Need For Mobile Files and How to Provide them Securely
sponsored by BlackBerry
WHITE PAPER: This white paper discusses the six tools mobile users need from their file management apps and gives advice on maintaining security while providing each one.
Posted: 13 Oct 2015 | Published: 13 Oct 2015

BlackBerry

The Power of Collaboration with an Expiration Date and Data-Centric Security
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will learn the role of data-centric security in expiration collaboration. Access this paper now to see why the movement of consumers to apps like Snapchat clearly presages a similar move for enterprises to EFSS tools with real expiration built in.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

BlackBerry

Top 5 Cloud Data Protection Challenges. Solved.
sponsored by Commvault
WHITE PAPER: This white paper serves as guide with which you can realize the full potential of your next cloud project. Read on to see how the following 5 challenges may impact your cloud integration strategy.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault
101 - 125 of 450 Matches Previous Page    3 4 5 6 7 8    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement