IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security White Papers (View All Report Types)
26 - 50 of 432 Matches Previous Page  |  Next Page
Ponemon Institute Application Security Risk Management Study
sponsored by IBM
WHITE PAPER: This report shows you the results of the recent Ponemon Institute study on how IT pros approach application security in their organizations. Inside, you'll see why many organizations are falling short of adequate application security and learn how you might patch your own application security vulnerabilities.
Posted: 27 Jul 2016 | Published: 01 Mar 2016

IBM

10 REASONS TO TEST, NOT GUESS
sponsored by Trustwave
WHITE PAPER: This infographic gives you 10 reasons you should test, not guess the strength of your security. Create a testing plan based on these 10 reasons and strengthen your security posture through more informed decision making.
Posted: 21 Jul 2016 | Published: 31 Dec 2015

Trustwave

Red Hat Product Security Risk Report 2015
sponsored by Red Hat
WHITE PAPER: Tools that detect and address critical vulnerabilities before they go public are crucial to empowering developers. Explore reasons you should implement open source tools with security in mind.
Posted: 20 Jul 2016 | Published: 20 Jul 2016

Red Hat

App Development Strategies fit for Governments
sponsored by Red Hat
WHITE PAPER: Application development, deployment, and ongoing management doesn't have to be difficult. Discover secure ways to implement DevOps practices using open-source tools.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Red Hat

Get Your Apps Back in Business
sponsored by Dell Software
WHITE PAPER: Discover a cloud-era data protection solution that combines rapid snap technology and recovery repository to back up, replicate, verify, and restore your data anywhere. Read on and explore how you can eliminate downtime and protect your critical workloads with this single, unified solution.
Posted: 13 Jul 2016 | Published: 31 Dec 2015

Dell Software

Manage Change, Enforce Security, and Incorporate Cloud in Your Windows Ecosystem
sponsored by Puppet
WHITE PAPER: Learn where to incorporate better levels of control, and how to automate the delivery and operation of Windows applications on premise and in the cloud. Plus, uncover the 5 questions decision-makers in a business need to be asking.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

Puppet

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover key features of ISFWs how their deployment can provide instant network visibility and protection. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Wireless Security Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Mobile Solutions for IBM LinuxONE
sponsored by IBM
WHITE PAPER: Delivering the best possible mobile experience is critical to staying competitive. Learn about a solution that combines the open and industry-leadingaspects of Linux with proven qualities of service resulting in the mostscalable enterprise-grade Linux environment.
Posted: 17 Jun 2016 | Published: 31 Aug 2015

IBM

Is Microsoft Office 365 Secure?
sponsored by Proofpoint, Inc.
WHITE PAPER: More than four in ten organizations are in the process of implementing Office 365 or already use it. This infographic gives you important statistics and insights on the top security, encryption and archiving challenges faced while moving to Office 365, based on a survey conducted by UBM Tech.
Posted: 08 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

Wireless Security Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 08 Jun 2016 | Published: 02 May 2016

Fortinet, Inc.

Proofpoint Advanced Security Platform for Microsoft Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: Safeguard against advanced threats and targeted attacks to your Office 365 users. Gain visibility and threat insights to identify attacks quickly and contain them as early as possible.
Posted: 08 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

Flash Storage: Powering the Future of IT
sponsored by IBM
WHITE PAPER: Flash storage not only provides the performance necessary to run next-generation applications – such as cloud, mobile and social systems, and data analytics – but also provides the security necessary to prevent data breaches. See how your enterprise can boost your competitive advantage by leveraging flash today.
Posted: 01 Jun 2016 | Published: 31 Jan 2015

IBM

Real-time Threat Detection: The Financial Industry's Best Friend
sponsored by HID
WHITE PAPER: Explore the effectiveness of real-time malware protection for financial institutions, banks, and any online business with financial transactions. See how this technology can help mitigate risks even from the most sophisticated malware.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

HID

Satisfy that Android sweet tooth: Making it work for your enterprise
sponsored by IBM MaaS360
WHITE PAPER: Protect your corporate data while giving users seamless access to work information on their devices. Take advantage of unified policies, threat management, app distribution, device management and a standard framework for a consistent experience across a wide variety of Android devices.
Posted: 26 May 2016 | Published: 01 Apr 2016

IBM MaaS360

Application Session Filtering 101
sponsored by Gigamon
WHITE PAPER: This guide presents a number of examples on how to use ASF in step-by-step recipes. It provides a methodology for identifying string patterns and regular expressions.
Posted: 24 May 2016 | Published: 31 Dec 2015

Gigamon

When App is the Business, the Business is the App Vol. 3
sponsored by IBM MaaS360
WHITE PAPER: IT needs to support each step in planning and developing apps to help ensure security throughout the app lifecycle. Learn the key security dangers of mobile apps in the enterprise and find out how to eliminate them in your app-driven business.
Posted: 20 May 2016 | Published: 01 Apr 2016

IBM MaaS360

When App is the Business, the Business is the App Vol. 2
sponsored by IBM MaaS360
WHITE PAPER: Empower your organization with a mobile application strategy that advances your business while providing scalability, sustainability and security. Learn how to design your business around applications without putting enterprise data at risk.
Posted: 20 May 2016 | Published: 01 Apr 2016

IBM MaaS360

Succeeding with Static Code Analysis: An Implementation Guide
sponsored by Programming Research
WHITE PAPER: Static code analysis can help you rapidly ensure the safety and security of embedded software, but it isn't a one-size-fits-all solution. Discover the biggest challenges that can prevent static code analysis from effectively detecting issues early on.
Posted: 19 May 2016 | Published: 19 May 2016

Programming Research

Mobilize Your Corporate Content and Apps
sponsored by IBM MaaS360
WHITE PAPER: Mobile collaboration holds the key to unlocking tremendous productivity, but many organizations have only begun to scratch the surface of mobile strategies. Discover how developing custom applications will greatly benefit your organization over current technologies filled with pitfalls.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Static Code Analysis: A Buyer's Guide
sponsored by Programming Research
WHITE PAPER: How can you select the right static code analysis solution to deliver reliable, safe, and secure software? Explore the major benefits and pitfalls of static code analysis tools, and discover best practices to optimize embedded software development.
Posted: 18 May 2016 | Published: 18 May 2016

Programming Research

Security essentials for CIO's enabling mobility - their device, your data
sponsored by IBM MaaS360
WHITE PAPER: Your goal is to make BYOD policies feasible by seamlessly securing corporate data on the device while providing logical separation from personal activities. Learn five key steps you should consider before putting your BYOD program in place.
Posted: 18 May 2016 | Published: 31 Dec 2012

IBM MaaS360

Jump start mobile productivity with MDM and secure file sharing
sponsored by Citrix
WHITE PAPER: Mobile device management is only a piece of the mobility puzzle. With mobile workers' collaboration demands are rising, making it hard to ensure the quality of service they need and the security they may not realize they need. Learn more about challenges to empowering mobile workers and how to ensure your critical data stays safe.
Posted: 13 May 2016 | Published: 30 Jun 2014

Citrix

Lifecycle Management Best Practices for Mobile Apps
sponsored by IBM
WHITE PAPER: This white paper explores the role of app security in mobile app lifecycle management. From design through deployment, learn about the proactive best practices that can simplify and strengthen the development process.
Posted: 11 Aug 2016 | Published: 31 Mar 2016

IBM

‘PowerShell’ Deep Dive: A United Threat Research Report
sponsored by Carbon Black
WHITE PAPER: Learn more about PowerShell and how cybercriminals are using it to expedite their criminal activities. This report outlines several techniques attackers use to leverage PowerShell to gain access to organizations' endpoints and provides suggestions on how security teams can detect, prevent and respond to such attacks.
Posted: 17 Jun 2016 | Published: 01 May 2016

Carbon Black
26 - 50 of 432 Matches Previous Page    1 2 3 4 5    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement