IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security White Papers (View All Report Types)
26 - 50 of 463 Matches Previous Page  |  Next Page
Get Your Apps Back in Business
sponsored by Dell Software
WHITE PAPER: Discover a cloud-era data protection solution that combines rapid snap technology and recovery repository to back up, replicate, verify, and restore your data anywhere. Read on and explore how you can eliminate downtime and protect your critical workloads with this single, unified solution.
Posted: 13 Jul 2016 | Published: 31 Dec 2015

Dell Software

Case Study: Defending Mobile Apps from Attacks
sponsored by Arxan
WHITE PAPER: Discover how a leading medical device manufacturer hardened their application protection strategy to allow physicians to securely read and monitor patient data, as well as securely control medical devices using mobile applications. Learn how you can gain similar security benefits for your own applications.
Posted: 12 Jul 2016 | Published: 01 Jun 2016

Arxan

Manage Change, Enforce Security, and Incorporate Cloud in Your Windows Ecosystem
sponsored by Puppet
WHITE PAPER: Learn where to incorporate better levels of control, and how to automate the delivery and operation of Windows applications on premise and in the cloud. Plus, uncover the 5 questions decision-makers in a business need to be asking.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

Puppet

State of Application Security Report
sponsored by Arxan
WHITE PAPER: You know why mobile apps must be secure, now learn why in this white paper. It provides recommendations for how organizations and consumers can minimize the risk of their mobile apps being hacked and how app developers can improve protection.
Posted: 05 Jul 2016 | Published: 01 Jun 2016

Arxan

7 Key Factors of a Highly Effective Application Protection Solution
sponsored by Arxan
WHITE PAPER: An effective application protection strategy is paramount to safeguarding the integrity and confidentiality of an application. This white paper discusses the 7 key factors that enable effective application protection, mitigating binary code risks and combating the latest security threats.
Posted: 30 Jun 2016 | Published: 01 May 2016

Arxan

Balancing Needs of Providers and Patients
sponsored by CloudMine
WHITE PAPER: Don't be one of the organizations that take a haphazard approach to leveraging the invaluable asset of your patients. Discover both sides of the communication divide and what steps to take to improve communication quickly.
Posted: 30 Jun 2016 | Published: 17 Mar 2016


Defeating the Threat Within
sponsored by Forcepoint
WHITE PAPER: Your critical data can be stolen by someone who interacts with your network daily. You need the right plan before it happens. Learn about the new wave of insider threats and start planning now.
Posted: 30 Jun 2016 | Published: 01 May 2016

Forcepoint

Connected Health Cloud Brochure
sponsored by CloudMine
WHITE PAPER: Discover the different facets of a healthcare app development tool that can help your healthcare organization quickly and reliably create apps that are HIPAA compliant.
Posted: 30 Jun 2016 | Published: 30 Jun 2016


Newly Announced Tools For Healthcare App Building
sponsored by CloudMine
WHITE PAPER: Discover the importance of an interoperability engine, cognitive analytics, and developer tools when building intelligent and compliant healthcare applications. Learn how to connect with leading big data analytics platforms, utilize cognitive analytics to improve compliance reporting, incorporate wearables into the continuum of care, and more.
Posted: 30 Jun 2016 | Published: 01 Mar 2016


Deciphering the Latest in iOS Open Source Healthcare Software
sponsored by CloudMine
WHITE PAPER: Learn how a Apple's newly released healthcare-focused, open source software framework can change the way healthcare app developers build and how they capture clinical research data in real-time.
Posted: 30 Jun 2016 | Published: 23 Mar 2016


Interoperability and the Cloud in Connected Health
sponsored by CloudMine
WHITE PAPER: Learn how to conquer the interoperability, compliance, and security issues holding your organization back from leveraging cloud platforms to develop revolutionary applications.
Posted: 29 Jun 2016 | Published: 29 Jun 2016


A letter from the CEO: Connected Health Cloud Release
sponsored by CloudMine
WHITE PAPER: If you've been struggling to derive meaningful data insights, now you can with a HIPAA-compliant cloud solution that won't break the bank. It connects with big-data analytics platforms to help you gain a better understanding of patient data and take action to improve outcomes (all with impeccable threat detection capabilities).
Posted: 28 Jun 2016 | Published: 01 Mar 2016


Accelerating the Building, Managing, and Deployment of Healhcare Apps
sponsored by CloudMine
WHITE PAPER: Discover how your healthcare organization can build and manage mobile and Web apps that ensure data is compliant and secure.
Posted: 28 Jun 2016 | Published: 04 Mar 2016


Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover key features of ISFWs how their deployment can provide instant network visibility and protection. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Wireless Security Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Mobile Solutions for IBM LinuxONE
sponsored by IBM
WHITE PAPER: Delivering the best possible mobile experience is critical to staying competitive. Learn about a solution that combines the open and industry-leadingaspects of Linux with proven qualities of service resulting in the mostscalable enterprise-grade Linux environment.
Posted: 17 Jun 2016 | Published: 31 Aug 2015

IBM

Axway SecureTransport Enhanced Managed File Transfer Gateway
sponsored by Axway
WHITE PAPER: Handle everything from high-volume automated file transfers between systems, sites and lines of business to user-driven communications and mobile file sharing. Ensure you're ready for high-growth uses cases while maintaining corporate controls and visibility.
Posted: 14 Jun 2016 | Published: 31 Dec 2015

Axway

Citrix NetScaler: A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: Denial of service (DoS) attacks are on the rise after years of relative dormancy. In that time they have evolved and are honed in on attacking the different networking layers. Discover how DoS attacks have evolved and how to approach DoS protection at each layer of your network.
Posted: 13 Jun 2016 | Published: 30 Jan 2015

Citrix

Comparison Guide Email Encryption
sponsored by ZixCorp
WHITE PAPER: Many businesses choose Office 365, a known, trusted name in email and email encryption. Fact is, Office 365 is objectively not the easiest to incorporate into business life when compared to the competition. Discover the comparison yourself in this white paper and reevaluate your organization's email solution.
Posted: 01 Jun 2016 | Published: 01 May 2016

ZixCorp

Flash Storage: Powering the Future of IT
sponsored by IBM
WHITE PAPER: Flash storage not only provides the performance necessary to run next-generation applications – such as cloud, mobile and social systems, and data analytics – but also provides the security necessary to prevent data breaches. See how your enterprise can boost your competitive advantage by leveraging flash today.
Posted: 01 Jun 2016 | Published: 31 Jan 2015

IBM

Real-time Threat Detection: The Financial Industry's Best Friend
sponsored by HID
WHITE PAPER: Explore the effectiveness of real-time malware protection for financial institutions, banks, and any online business with financial transactions. See how this technology can help mitigate risks even from the most sophisticated malware.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

HID

Satisfy that Android sweet tooth: Making it work for your enterprise
sponsored by IBM MaaS360
WHITE PAPER: Protect your corporate data while giving users seamless access to work information on their devices. Take advantage of unified policies, threat management, app distribution, device management and a standard framework for a consistent experience across a wide variety of Android devices.
Posted: 26 May 2016 | Published: 01 Apr 2016

IBM MaaS360

Application Session Filtering Cookbook
sponsored by Gigamon
WHITE PAPER: This guide presents a number of examples on how to use ASF in step-by-step recipes. It provides a methodology for identifying string patterns and regular expressions.
Posted: 24 May 2016 | Published: 31 Dec 2015

Gigamon

‘PowerShell’ Deep Dive: A United Threat Research Report
sponsored by Carbon Black
WHITE PAPER: Learn more about PowerShell and how cybercriminals are using it to expedite their criminal activities. This report outlines several techniques attackers use to leverage PowerShell to gain access to organizations' endpoints and provides suggestions on how security teams can detect, prevent and respond to such attacks.
Posted: 17 Jun 2016 | Published: 01 May 2016

Carbon Black

Wireless Security Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 08 Jun 2016 | Published: 02 May 2016

Fortinet, Inc.
26 - 50 of 463 Matches Previous Page    1 2 3 4 5    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement