IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
1 - 25 of 773 Matches Previous Page  |  Next Page
Digital Transformation: Why Financial Services Companies Are Adopting A Suite Approach To Software
sponsored by NetSuite
WHITE PAPER: As the pace of change continues to accelerate in the financial services industry, digital transformation has become key for staying ahead of the curve. But where to begin on the digital transformation journey? Learn how to take the first step for your financial services firm to keep competitive, improve application security, and more.
Posted: 23 May 2017 | Published: 23 May 2017

NetSuite

5 Tips for Improving Collaboration
sponsored by Microsoft
WHITE PAPER: Introducing new apps leads to unnecessary sprawl, forces employees to learn how to use a new tool, and makes it harder for you to ensure that your employees can collaborate and communicate securely. This white paper discusses five points to improving collaboration and what you need to look for in evaluating a collaboration platform.
Posted: 23 May 2017 | Published: 23 May 2017

Microsoft

The Security Compliance Countdown
sponsored by Citrix
RESOURCE: Businesses everywhere are bracing for the GDPR takeover. See what issues are causing IT anxiety and learn what you can do to get ahead.
Posted: 19 May 2017 | Published: 19 May 2017

Citrix

Avoid Human Error with AWS CodeDeploy
sponsored by Splunk
EGUIDE: Want to avoid human error in code deployment? This e-guide covers how you can effectively use AWS CodeDeploy to automate code deployment to your servers and committing avoid manual errors.
Posted: 18 May 2017 | Published: 11 May 2017

Splunk

2016 Mobile Security & Business Transformation Study
sponsored by IBM
RESEARCH CONTENT: In this research report, learn how mobile adoption grew and changed in 2016, and how this information can help you secure your apps and devices in the years to come.
Posted: 16 May 2017 | Published: 16 May 2017

IBM

Why You Need Advanced Application Services in Your Private Cloud
sponsored by F5 Networks
WHITE PAPER: The private cloud is being increasingly utilized to run virtual machines and mission-critical applications. The issue is that you need to support these apps with services, like security, that are not usually built-in. Access this white paper to learn the best ways to support your apps in the private cloud and maximize your resources.
Posted: 11 May 2017 | Published: 30 Dec 2016

F5 Networks

Build a Better Cloud
sponsored by F5 Networks
EGUIDE: This e-guide details common cloud migration challenges and will give you the foundation to support your technology as your business scales.
Posted: 09 May 2017 | Published: 09 May 2017

F5 Networks

Citrix ShareFile eases IT migration to Windows 10®
sponsored by Citrix
WHITE PAPER: Access this white paper to discover a technology that eases OS migrations making future updates simpler. And, find out how the technology allows user data to be freed from devices, protected from overwrites and under your control.
Posted: 09 May 2017 | Published: 09 May 2017

Citrix

DevSecOps: Putting the Security in DevOps
sponsored by Sonatype
EGUIDE: Security in DevOps, aptly named DevSecOps, is something that your development organization is going to have to deal with soon. This e-guide is your primer to bringing these two departments together when they come from such different perspectives. Learn how to improve collaboration, incorporate security earlier in development, and more.
Posted: 08 May 2017 | Published: 04 May 2017

Sonatype

Secure Agile Development: Why Can't We All Get Along?
sponsored by Veracode, Inc.
WEBCAST: As developers turn to Agile methodologies to accelerate development, app security can often get left in the dust. This webcast explores strategies for increasing collaboration between development and security teams. Learn how to bring security testing up to speed to ensure software quality in Agile development environments.
Posted: 05 May 2017 | Premiered: May 5, 2017

Veracode, Inc.

Coordinating Sec, Dev, and Ops: Improving App Security for Agile Methodologies
sponsored by Veracode, Inc.
WEBCAST: This webcast explores how to update app security and improve software quality by integrating security into the app development process from beginning to end. Find out how to unite security teams with both Dev and Ops by leveraging strategies for building trust between the different teams and fostering collaboration.
Posted: 05 May 2017 | Premiered: May 5, 2017

Veracode, Inc.

Mobile, Cloud & Desktop Security: 3 Keys to Digital Success
sponsored by MobileIron
WHITE PAPER: What's holding so many organizations back from using mobile to its full potential? Mobile, cloud, and desktop security. Access this white paper to learn how to protect your critical data on any device, network, or cloud service so you can focus on delivering business value instead of reacting to security threats and fighting fires.
Posted: 05 May 2017 | Published: 30 Dec 2016

MobileIron

End Web Application Security Risks with WAF
sponsored by F5 Networks
EGUIDE: In this expert e-guide, educate yourself on all things WAF by discovering how a WAF works, the best WAF features and more. Additionally, learn how to further resolve web application vulnerabilities.
Posted: 04 May 2017 | Published: 01 May 2017

F5 Networks

Secure Apps at the Speed of DevOps
sponsored by Veracode, Inc.
RESEARCH CONTENT: This Forrester Research report explores the importance of uniting security pros with Dev and Ops to deliver on accelerated secure app development. Uncover the report's key findings to learn how to build security into earlier stages of the app lifecycle to remediate vulnerabilities without sacrificing speed.
Posted: 04 May 2017 | Published: 16 Dec 2016

Veracode, Inc.

An Essential Guide to IoT App Development
sponsored by Mendix
WHITE PAPER: With varying levels of complexity for endpoints, software, security, and integration, the defining elements of IoT can seem overwhelming. To help guide you through IoT adoption, this paper digs down into the anatomy of IoT and explores how to overcome the challenges of IoT app development.
Posted: 04 May 2017 | Published: 04 May 2017

Mendix

Free Download: CISSP Certification Strategic Guide
sponsored by TechTarget
RESOURCE: For security professionals, CISSP certification is globally recognized as a standard of achievement which is why we partnered with (ISC)2 to create CISSP Certification: A step-by-step strategic guide. Fill out this short survey to receive immediate access to this resource and one step closer certification.
Posted: 03 May 2017 | Published: 18 Apr 2014

TechTarget

Putting Security Into DevOps
sponsored by Veracode, Inc.
WHITE PAPER: This white paper explores how DevOps helps you weave security testing, validation, and monitoring into each stage of the app lifecycle. Find out how to enable secure DevOps app development, and pave the way for continuous integration and continuous deployment.
Posted: 03 May 2017 | Published: 30 Oct 2015

Veracode, Inc.

The Developer's Guide to the DevSecOps Galaxy
sponsored by Veracode, Inc.
WHITE PAPER: Bringing developers and operations staff together under the singular DevOps roof means trying to mesh contradictory approaches, leaving open security concerns. DevSecOps to the rescue! Access this white paper to learn about DevSecOps challenges, best practices, and more!
Posted: 03 May 2017 | Published: 03 May 2017

Veracode, Inc.

How to Showcase Your Skills and Become a Star Developer
sponsored by Veracode, Inc.
WHITE PAPER: In today's world where coding languages rise and fall at the drop of a hat, it can be difficult to keep up. In this white paper, learn 3 tricks to developing and showcasing your skills not just to succeed now, but to position yourself for success throughout your career.
Posted: 03 May 2017 | Published: 03 May 2017

Veracode, Inc.

Automating Governance with DevOps and Supply Chain Management
sponsored by Sonatype
RESEARCH CONTENT: This Forrester Research report explores how to catch governance up to the speed of rapid app development practices with automated supply chain management. Learn how to deliver on the accelerated DevOps' time-to-market without sacrificing software quality and compliance.
Posted: 02 May 2017 | Published: 10 Nov 2016

Sonatype

How to Automate Security into Your DevOps Pipeline
sponsored by Veracode, Inc.
WHITE PAPER: Manual penetration testing and on-premise tools help prevent breaches, but they're too slow for an increasingly fast-paced, mobile-first world. Discover how to accelerate time-to-market without sacrificing app compliance by integrating security into your existing toolchains and DevOps pipelines.
Posted: 01 May 2017 | Published: 01 May 2017

Veracode, Inc.

The Top 6 WAF Essentials to Achieve Application Security Efficacy
sponsored by Citrix
WHITE PAPER: Due to the nature of web security and how it constantly evolves, it is increasingly difficult to integrate comprehensive security into applications and keep them up-to-date. In this white paper, learn the 6 essential features your web application firewall (WAF) needs to maintain a high degree of security,
Posted: 27 Apr 2017 | Published: 27 Apr 2017

Citrix

How to Manage Oracle E-Business Suite Apps and Databases
sponsored by Data Intensity
ESSENTIAL GUIDE: In this expert e-guide, explore how to simplify and achieve a number of tasks that go into managing Oracle E-Business Suite (EBS) and databases, including patch updates, improving security, and managing cost-based optimizer stats.
Posted: 26 Apr 2017 | Published: 20 Apr 2017

Data Intensity

Maximizing The Value of Web Application Firewalls
sponsored by Akamai
WHITE PAPER: In this white paper, learn some best practices for managing your web application firewall (WAF) such as 3 basic rules for running your WAF when it's in 'alert mode', why data analytics is key to building an intelligent WAF, and more.
Posted: 21 Apr 2017 | Published: 29 Apr 2016

Akamai

How to Resolve a Web Application Security Vulnerability
sponsored by Veracode, Inc.
EGUIDE: Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.
1 - 25 of 773 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement