IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
1 - 25 of 805 Matches Previous Page  |  Next Page
Keep Mobile Apps Safe With These Security Best Practices
sponsored by WhiteCryption
EGUIDE: Access this expert guide for advice on solving your mobile security challenges through better mobile app protection.
Posted: 24 Nov 2015 | Published: 24 Nov 2015


Building the Business Case for Mobile Banking Security Solutions
sponsored by HID
WHITE PAPER: This white paper presents talking points to help IT make the business case for bolstering mobile banking security. Also inside, discover the top 5 features you need to have for mobile banking security success
Posted: 23 Nov 2015 | Published: 11 Nov 2015


A Security Champion's Guide to Web Application Security
sponsored by Akamai
WHITE PAPER: Access this resource for tips on ensuring your web applications aren't the weakest link in your enterprise security strategy.
Posted: 23 Nov 2015 | Published: 23 Nov 2015


Best Practices for Endpoint Security Software and Devices
sponsored by BitDefender
EGUIDE: Access this expert guide for detailed advice on purchasing the right endpoint security solution, implementing endpoint security best practices, and more.
Posted: 23 Nov 2015 | Published: 23 Nov 2015


The Rise of the Anytime-Anywhere Mobile Worker
sponsored by Good Technology
WHITE PAPER: In this white paper, you will learn how to harness the power of your anytime-anywhere workforce by viewing 8 key considerations to evaluate mobile platforms. Discover how to securely mobilize your enterprise, while also considering mobile data protection, app development, and more.
Posted: 23 Nov 2015 | Published: 31 Dec 2014

Good Technology

Cybersecurity Strategy Needs to be More Dynamic
sponsored by Unisys
EGUIDE: This expert e-guide explores app vulnerabilities and security strategy shortcomings and how you can fill in the gaps and adjust your approach to adapt to the changing threat landscape. View now to learn why a walled network will enable more data breaches to succeed and how to take a more holistic view of cybersecurity.
Posted: 20 Nov 2015 | Published: 18 Nov 2015


Cloud Security Risks Still An Issue for CIOs, but Change Is in the Air
sponsored by Oracle Corporation
EGUIDE: This e-guide discusses how cloud security risks will be less of a barrier to adoption as cloud service providers are allowing potential customers to conduct infrastructure assessments and publishing SOC reports on their security controls. Read on to learn more about how self-education and enlightened vendor response can ease your move to the cloud.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Oracle Corporation

Reimagine, Reinvent, Run: SAP in the Digitial Economy
sponsored by SAP America, Inc.
WHITE PAPER: This brief whitepaper discusses some of the ways SAP is changing how the world operates, with particular focus on efficiency. Access now to see how SAP could revamp your business as well.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

SAP America, Inc.

Device Fingerprinting: A New Tool for Enhanced Application Protection
sponsored by Radware
WHITE PAPER: This white paper outlines the 5 common factors challenging IP-based identification and presents an overview of device fingerprinting to gather IP-agnostic information to detect malicious sources and users. View now and discover how to mitigate today's top app threats including, web scraping, bots, DDoS, and more.
Posted: 19 Nov 2015 | Published: 05 Jan 2015


Web Application Firewall: Protect the Perimeter
sponsored by Akamai
WHITE PAPER: In this white paper, learn how web application firewalls (WAFs) bolster network perimeter security to stop threats before the infiltrate the enterprise.
Posted: 18 Nov 2015 | Published: 18 Jun 2014


Protection from the Inside: Application Security Methodologies Compared
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this paper, the SANS Institute captures the relative capabilities and efficiencies of RASP and WAF technologies using a representative product in each category. Learn how your defense-in-depth strategy could benefit from the additional visibility of runtime protection.
Posted: 18 Nov 2015 | Published: 16 Apr 2015

Hewlett Packard Enterprise

Ten Areas of Difference Between Citrix and VMware Application Virtualization Solutions
sponsored by Citrix
WHITE PAPER: This white paper offers important questions to consider when selecting an application virtualization solution. Access now to see which solution can provide your enterprise with full mobile productivity, great user experience, rich features to make life easier for IT, and security and compliance capabilities to help protect your organization.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


Customer-Focused Organizations Must Take A Strategic Approach To “Identity Relationship Management”
sponsored by ForgeRock
WHITE PAPER: Forrester Consulting has evaluated companies' IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones. Read on and discover why it pays to implement IRM solutions that treat customer identities, and their identity data, as mission-critical for the top line of the business.
Posted: 17 Nov 2015 | Published: 31 Jan 2014


Identity as a Revenue Generator: Getting Started with Customer-Focused Identity Management
sponsored by ForgeRock
WHITE PAPER: There's identity management, and then there's customer-focused identity management. Access this white paper to learn the difference, and how the latter can bring you benefits from your cloud, mobility, and IoT initiatives.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


The Identity of Things (IDoT): Access Management (IAM) Reference Architecture for the Internet Of Things (IoT)
sponsored by ForgeRock
WHITE PAPER: This white paper describes how to apply identity services based on the underlying device architecture, as well as the native protocols and standards being used. Access now and discover which features play a significant role in applying identity services.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


Sandboxing: CPU-Level Threat Prevention
sponsored by Check Point Software Technologies Ltd.
VIDEO: This brief video explores how you can detect advanced malware that hides in the CPU-level of an application. Discover how you can stop even the most advanced and evasive threats.
Posted: 17 Nov 2015 | Premiered: 04 May 2015

Check Point Software Technologies Ltd.

The Expanding Role and Importance of Application Delivery Controllers (ADCs)
sponsored by Radware
WHITE PAPER: In this white paper, learn how Application Delivery Controllers (ADCs) have moved beyond load balancing to become a critical network security control.
Posted: 12 Nov 2015 | Published: 02 Feb 2015


Making "Things" Secure: Towards a Safer Internet of Things
sponsored by Symantec Corporation
WEBCAST: This webcast discusses different IoT applications and exposes how important security and reliability is when putting together an IoT system. Access now to see the top 10 vulnerabilities of IoT applications, including insecure network services, insufficient security configurability, and inefficient authentication, and learn how you can resolve them.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015

Symantec Corporation

How to Ensure Success of Your Mobile App Development Projects
sponsored by IBM
WHITE PAPER: In this report, you will learn the best practices for successful mobile application development. Read on to make your mobile project shine with a checklist of project guidelines, as well as advice on how to enable flexible mobile app development platforms with cloud.
Posted: 11 Nov 2015 | Published: 11 Nov 2015


Mac OS X Security Checklist
sponsored by JAMF Software
WHITE PAPER: This white paper presents a simple strategy for efficiently and successfully implementing the CIS benchmark for OS X to secure Mac users from data loss/theft. Read on to learn more.
Posted: 11 Nov 2015 | Published: 29 Oct 2015

JAMF Software

Cloud Application Discovery, SSO, and Threat Prevention for Cloud Apps
sponsored by IBM
VIDEO: Watch this video, to hear about strategies for tackling cloud security challenges from cloud security expert Ravi Srinivasan.
Posted: 11 Nov 2015 | Premiered: 22 Sep 2015


CISOs' Guide to Enabling a Cloud Security Strategy: Focus on SaaS
sponsored by IBM
WHITE PAPER: This analyst report covers key reasons why you should put SaaS first in your cloud security strategy. Access now and discover 15 ways you can get started.
Posted: 10 Nov 2015 | Published: 30 Oct 2015


The New Cloud Security Hero
sponsored by IBM
VIDEO: The following webinar features insights from industry leaders on the latest in cloud security developments. Learn three key ways to address your cloud security issues.
Posted: 10 Nov 2015 | Premiered: 10 Nov 2015


How to Deliver Value, Not Risk, With Your Organization's Mobile Apps
sponsored by IBM
WEBCAST: To insulate your organization from modern security threats and earn the trust of your customers, this webcast explains, you need to bolster your apps against threats from all sides. View now to learn how one platform can address your mobile app security challenges.
Posted: 06 Nov 2015 | Premiered: Sep 2, 2015


Don't Believe the Hype - All Containers are Not Equal
sponsored by Good Technology
WHITE PAPER: This white paper identifies various data leakage vulnerabilities and presents the questions IT needs to ask when choosing a containerization strategy.
Posted: 11 Nov 2015 | Published: 11 Jun 2015

Good Technology
1 - 25 of 805 Matches Previous Page    1 2 3 4    Next Page
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement