IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security White Papers (View All Report Types)
26 - 50 of 439 Matches Previous Page  |  Next Page
Veracode Integrations
sponsored by Veracode, Inc.
WHITE PAPER: As more organizations move to DevOps, application security needs to keep up or risk being left behind. Access this white paper to learn how you can integrate your application security with your security and development teams' existing tools and processes.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Veracode, Inc.

Sophos Phish Threat
sponsored by Sophos, Inc.
WHITE PAPER: Look at this white paper to learn how to automate defense education for your users with routine campaigns, training, follow-up and reporting.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Sophos, Inc.

Enterprise Mobility Trends to Watch in 2017: Q&A with Sumit Dhawan
sponsored by VMware
WHITE PAPER: Download this Q&A to find out how companies can turn problematic realities such as shadow IT and BYO trends, into real business value.  And, discover additional insights into key enterprise mobility trends to watch—and how to take action.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

VMware

The Security Professional's Role in a DevSecOps World
sponsored by Veracode, Inc.
WHITE PAPER: A National Institute of Standards and Technology study found that it is 6 times more costly to fix vulnerabilities in production vs. during coding. In this white paper, gain insight into how DevSecOps is the future of software development.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Veracode, Inc.

6 Things That Will Accelerate Enterprise Mobility Security Adoption
sponsored by SyncDog
WHITE PAPER: According to a recent Gartner press release, 75% of mobile applications do not include basic security testing. Are you equipped to handle a massive cybersecurity breach from mobile device vulnerability? Security experts believe the marketplace isn't prepared.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

SyncDog

SyncDog Metropolitan Police Department Case Study
sponsored by SyncDog
WHITE PAPER: In this case study, find out how a large metro police department faced dramatic improvements of workflow and compliance for handling of crime-scene data.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

SyncDog

Strategies for API Security
sponsored by Akamai Technologies
WHITE PAPER: This white paper explores the history of APIs and what makes them unique. Then, read on to learn 5 common threats facing APIs today a 3-tiered approach to securing both JSON and XML-based API endpoints, and more.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

Akamai Technologies

Secure Mobile App Development with PowWow Smart UX & VMware Workspace ONE
sponsored by PowWow
WHITE PAPER: Learn how to create, secure, deploy, and manage next-gen mobile apps quickly and efficiently with the PowWow Smart UX and VMware Workspace ONE platforms.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

PowWow

Single Sign-on for SAP Solution-based Environments
sponsored by One Identity
WHITE PAPER: Authentication Services from One Identity enables many non-Windows systems – including SAP solutions – to participate as "full citizens" in Active Directory, making SSO a reality. Take a look at this white paper to uncover security benefits provided by authentication services.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

One Identity

Extending Native Active Directory Capabilities to Unix and Linux
sponsored by One Identity
WHITE PAPER: As enterprises become more complex, involving multiple operating systems, the challenges of identity management also become greater. Take a closer look at this white paper to explore how you can simplify identity management across multiple operating systems.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

One Identity

ActivID Authentication Appliance for Enterprise
sponsored by HID Global
WHITE PAPER: While it's a necessity to provide employees, contractors, partners, and customers anytime, anywhere access to appropriate resources, it's also imperative that enterprises are able to maintain their security. Take a look at this white paper to reveal an authentication platform that can help you deliver access to the right users at the right time.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

HID Global

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)
sponsored by CyberArk Software, Inc
WHITE PAPER: Discover why securing and managing privileged accounts should be an integral part of your organization's strategy in achieving SWIFT CSCF compliance.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

CyberArk Software, Inc

Top 10 AWS Cloud Security Risks and how to Resolve them
sponsored by evident.io
WHITE PAPER: While AWS ensures the security of the cloud, you have a responsibility to manage the security of your data and systems in the cloud. Uncover 10 security risks found in AWS deployments, why they are important, and how they are remediated.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

evident.io

Digital Documents, Compliance, and the Cloud
sponsored by J2 Cloud Services
WHITE PAPER: This white paper highlights the challenges associated with managing sensitive e-documents that possibly contain intellectual property. Learn best practices for tracking, reporting, and sharing e-documents in the cloud.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

J2 Cloud Services

Location Services: Bridging the Physical and Digital Divide
sponsored by Aruba Networks
WHITE PAPER: In this white paper, learn how you can take advantages of BLE-based asset tags and BLE-enabled access points to meet the required accuracy and latency demands for enterprise mobile initiatives.
Posted: 15 Sep 2017 | Published: 15 Sep 2017

Aruba Networks

eFax Corporate Unmasked: The Top 10 Fax Essential Questions Answered
sponsored by J2 Cloud Services
WHITE PAPER: In this online resource, find the answers for the top 10 questions to asked during eFax Corporate Webinar series over the past year.
Posted: 12 Sep 2017 | Published: 20 Jun 2017

J2 Cloud Services

Security for your Cloud-based Web Applications
sponsored by Alert Logic
WHITE PAPER: This Aberdeen Research paper explores the complexity and change in security of cloud-based Web applications and how a "stacked" security approach can prevent DDoS attacks.
Posted: 11 Sep 2017 | Published: 30 Apr 2017

Alert Logic

Solving API Performance, Reliability, and Security Challenges
sponsored by Akamai Technologies
WHITE PAPER: In this white paper, find out the top questions you should be asking when you review existing and future APIs.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Akamai Technologies

The New Economics of Cloud Security
sponsored by Alert Logic
WHITE PAPER: In this white paper, learn the 4 principles of a fully managed Security-as-a-Service (SECaaS) to help protect cloud applications without breaking the bank or compromising customer satisfaction.
Posted: 07 Sep 2017 | Published: 07 Sep 2017

Alert Logic

4 Facts about APIs: The Hidden Technology Powering the Internet
sponsored by Akamai Technologies
WHITE PAPER: In this resource, learn the 4 facts about APIs revealed in a recent survey completed by business leaders from over 400 leading technology companies.
Posted: 06 Sep 2017 | Published: 28 Feb 2017

Akamai Technologies

VoIP Adoption Leads to Free PCI Upgrades for Major Quick Service Restaurant
sponsored by Hughes Network Systems
WHITE PAPER: The case study uncovers how VoIP adoption and network service consolidation helped a popular restaurant chain address growing cybersecurity challenges and increase their bandwidth for the best network connection.
Posted: 01 Sep 2017 | Published: 30 Apr 2017

Hughes Network Systems

As Learning Hinges On Devices And Applications, Challenges Increase For IT
sponsored by IBM
WHITE PAPER: Explore the importance of putting security measures in place to restrict apps, documents and data to specific users and groups, ensuring sensitive data does not end up in the wrong hands. Learn from the education industry on how endpoint management can help you achieve stronger data security.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

IBM

Best-of-Breed Enterprise Mac Management
sponsored by JAMF
WHITE PAPER: Download this white paper to discover a full Mac client management tool built to support the underlying architecture of macOS from the ground up, that gives IT administrators the flexibility to gather inventory data in a way that's extendable and customizable, integrated, actionable and auditable.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

JAMF

Your Guide to HIPAA Compliance for Containers
sponsored by Twistlock, Inc.
WHITE PAPER: With the advent of microservices it is likely that many new healthcare apps are being built with containers. Discover how to achieve compliance with the HIPAA Security Rule for containerized workloads for healthcare apps.
Posted: 20 Jul 2017 | Published: 20 Jul 2017


Cyber security solutions from IBM
sponsored by IBM
WHITE PAPER: Government agencies rely on the Internet to store large amounts of data. As a result, internal and external threats are a growing concern for personal and valuable information. This informative white paper offers cyber security solutions to ensure protection.
Posted: 28 Aug 2017 | Published: 20 Jul 2012

IBM
26 - 50 of 439 Matches Previous Page    1 2 3 4 5    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement