IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security White Papers (View All Report Types)
26 - 50 of 401 Matches Previous Page  |  Next Page
2016 State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: This report provides you with tangible AppSec benchmarks with which to measure your own programs against. Discover stats and figures on the risk of applications and overall industry remediation trends.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Discover how to successfully integrate security with DevOps and learn 5 principles your security strategy must address. Furthermore, understand how DevOps and CI/CD are different from Agile development and how this difference changes the requirements for application security.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Why You Need to Test All Your Cloud, Mobile and Web Applications
sponsored by Trustwave
WHITE PAPER: Uncover the importance of complete application testing and find recommendations on how to beat the challenges associated with protecting all web applications. Learn how to prioritize testing to receive the greatest ROI and manage your risk without a huge monetary investment.
Posted: 18 Oct 2016 | Published: 31 Dec 2014

Trustwave

Stop Malware Before It Stops You
sponsored by Trustwave
WHITE PAPER: Discover how to detect and eliminate modern malicious activities and add significant value to your detection mechanism without impacting user experience. Learn how to stop new, dynamic malware that most mechanisms overlook, as well as close the 60% malware gap missed by other gateways.
Posted: 18 Oct 2016 | Published: 31 Dec 2013

Trustwave

Top 5 Applications You Should Blacklist Now
sponsored by Thycotic
WHITE PAPER: Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Gain the best practices for restricting malicious software.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

Thycotic

Don't Guess. Test. Uncover Your Security Vulnerabilities
sponsored by Trustwave
WHITE PAPER: Learn how to get full visibility and insight into your organization's security weaknesses. Discover the robust tools you need to get an accurate assessment of your databases and applications and avoid annoying false positives.
Posted: 17 Oct 2016 | Published: 30 Sep 2016

Trustwave

Analysts Reveal how to Secure SaaS
sponsored by Palo Alto Networks
WHITE PAPER: This report illustrates the explosive growth of SaaS applications, and their role in creating significant security challenges for IT teams. Learn how CASB products can help deliver the visibility and granular control you need to protect and secure these apps.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Securing Office 365 Is Easier Than You Think
sponsored by Palo Alto Networks
WHITE PAPER: SaaS security concerns can no longer be ignored: Discover how to safely enable Office 365. Read on to address O365-specific security concerns, including details on how to secure O365 from malware insertion and data loss, gain visibility into SaaS usage, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Palo Alto Networks

Securing the Unpatchable
sponsored by Palo Alto Networks
WHITE PAPER: Discover how to secure unpatchable systems and software with advanced endpoint protection, defending against the most complex cyberattacks. You will learn how to prevent the exploitation of both known and zero-day vulnerabilities, as well as the execution of malware, as demonstrated by two case studies.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

Five Signs It’s Time for Mobile Workspace Delivery
sponsored by Citrix
WHITE PAPER: Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.
Posted: 25 Aug 2016 | Published: 29 Jul 2016

Citrix

Manage Risk by Protecting Apps, Data and Usage
sponsored by Citrix
WHITE PAPER: When it comes to securing vulnerabilities, especially in apps, there are 5 best practices you can follow. This white paper provides and overview of how to ensure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Citrix

Day in the Life of a Security Admin
sponsored by RSA Softcat
WHITE PAPER: It's now easier than ever to allow users full access to all network tools and data with a single username and password combination. Learn how to set precise security requirements for each application for any user, from anywhere, to anything.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

10 REASONS TO TEST, NOT GUESS
sponsored by Trustwave
WHITE PAPER: This infographic gives you 10 reasons you should test, not guess the strength of your security. Create a testing plan based on these 10 reasons and strengthen your security posture through more informed decision making.
Posted: 21 Jul 2016 | Published: 31 Dec 2015

Trustwave

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover key features of ISFWs how their deployment can provide instant network visibility and protection. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Citrix NetScaler: A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: Denial of service (DoS) attacks are on the rise after years of relative dormancy. In that time they have evolved and are honed in on attacking the different networking layers. Discover how DoS attacks have evolved and how to approach DoS protection at each layer of your network.
Posted: 13 Jun 2016 | Published: 30 Jan 2015

Citrix

Is Microsoft Office 365 Secure?
sponsored by Proofpoint, Inc.
WHITE PAPER: More than four in ten organizations are in the process of implementing Office 365 or already use it. This infographic gives you important statistics and insights on the top security, encryption and archiving challenges faced while moving to Office 365, based on a survey conducted by UBM Tech.
Posted: 08 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

Wireless Security Survey
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 08 Jun 2016 | Published: 02 May 2016

Fortinet, Inc.

Is Additional Security Needed for Office 365?
sponsored by Proofpoint, Inc.
WHITE PAPER: Safeguard against advanced threats and targeted attacks to your Office 365 users. Gain visibility and threat insights to identify attacks quickly and contain them as early as possible.
Posted: 08 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

Android for corporate life
sponsored by IBM MaaS360
WHITE PAPER: Protect your corporate data while giving users seamless access to work information on their devices. Take advantage of unified policies, threat management, app distribution, device management and a standard framework for a consistent experience across a wide variety of Android devices.
Posted: 26 May 2016 | Published: 01 Apr 2016

IBM MaaS360

Neustar DDOS Attacks & Protection Report: North America & EMEA The Continuous Risk to Digital Brands
sponsored by Neustar
WHITE PAPER: This report encapsulates the survey results of 760 CSOs, CIOs, CTOs and others in IT security. Its purpose is to learn how companies in North America and the EMEA region (Europe, the Middle East, and Africa) encounter and defend against DDoS attacks.
Posted: 28 Sep 2016 | Published: 31 Dec 2015

Neustar

Trends in SAP Cybersecurity
sponsored by IBM
WHITE PAPER: The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 29 Aug 2016 | Published: 01 Feb 2016

IBM

Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices
sponsored by Lenovo Software
WHITE PAPER: This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.
Posted: 26 Aug 2016 | Published: 21 Sep 2015

Lenovo Software

Total Economic Impact (TEI) Study
sponsored by IBM
WHITE PAPER: This Forrester study examines the potential return on investment (ROI) enterprises may realize by identifying web-based and mobile application source code vulnerabilities early in the software development life cycle.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

IBM

Lifecycle Management Best Practices for Mobile Apps
sponsored by IBM
WHITE PAPER: This white paper explores the role of app security in mobile app lifecycle management. From design through deployment, learn about the proactive best practices that can simplify and strengthen the development process.
Posted: 11 Aug 2016 | Published: 31 Mar 2016

IBM

Wireless Security Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.
26 - 50 of 401 Matches Previous Page    1 2 3 4 5    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement