IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
1 - 25 of 815 Matches Previous Page  |  Next Page
How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PODCAST: Today's healthcare organizations are struggling to meet the demands of reform while maintaining security and privacy for patients. Tune into this podcast as leaders from the nation's leading health systems discuss why application virtualization is reshaping care delivery and improving security.
Posted: 01 Dec 2016 | Premiered: Nov 17, 2016

Citrix and Pure Storage

Maximize Performance and Mitigate Risks with PHP 7
sponsored by Rogue Wave Software
WHITE PAPER: This white paper examines PHP, a tried and true platform for business-critical apps that has driven web and mobile growth for a number of years. Access now to learn more about the release of PHP 7, which introduces new language constructs and significantly enhanced performance, and uncover insightful tips on how to optimize your use of PHP.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

Rogue Wave Software

A Network Security View Of Docker Containers
sponsored by NeuVector
WEBCAST: Many top concerns for containers can be addressed with a better understanding of basic container security and networking. Learn tips for getting visibility into container networking to create a more secure environment overall.
Posted: 30 Nov 2016 | Premiered: Oct 31, 2016

NeuVector

Devise a Cloud Strategy that Doesn't Cast a Shadow on App Performance
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Download this paper to learn how to devise a cloud strategy that doesn't cast a shadow on, or deter, app performance. Discover several cloud deployment models compared for their visibility and control, including private cloud, SaaS, and 2 more.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

Riverbed Technology, Inc.

The Evolution of Cloud Security: Perception vs. Reality
sponsored by BitGlass
WHITE PAPER: This survey of over 2,200 cybersecurity professionals offers insight into both the current perception and the reality of cloud security. Access now to learn more about how security is catching up with cloud apps, and affecting areas like shadow IT, legacy security tools, popular business apps like Office 365, and more.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

When "Free" is not Free: The True Costs of Open Source
sponsored by Rogue Wave Software
WEBCAST: In this webinar, director of product management and OSS expert, Richard Sherrard examines how to know exactly what packages are used in your company, specific technical, security, and licensing hurdles that many organizations face and What "free" actually means when it comes to OSS.
Posted: 28 Nov 2016 | Premiered: Oct 31, 2016

Rogue Wave Software

The Intricacies of a CASB Revealed
sponsored by BitGlass
WEBCAST: This webinar goes in-depth into the inner workings of Cloud Access Security Brokers (CASBs), how they work, and how to maximize their effect in your organization.
Posted: 23 Nov 2016 | Premiered: Aug 10, 2016

BitGlass

IBM FlashSystem: Powering the Future of IT
sponsored by IBM
WHITE PAPER: This white paper explains how flash storage can provide the performance and security needed to run these apps and prevent data breaches. Access now and discover how flash can help 5 key drivers of info technology: cloud, data analytics, mobile and social engagement and security.
Posted: 23 Nov 2016 | Published: 30 Jan 2015

IBM

Open Source Software Support: Top Challenges and Best Practices
sponsored by Rogue Wave Software
WHITE PAPER: This report takes real support data from hundreds of open source software (OSS) packages across different organizations to analyze the statistics, realities, and results of open source in the field. Learn how to provide effective support for OSS by tackling the top challenges identified in the survey's data and uncover 5 OSS support best practices.
Posted: 23 Nov 2016 | Published: 31 Dec 2015

Rogue Wave Software

Why DevOps + Security = A Bright Idea
sponsored by SearchSecurity.com
EBOOK: By combining DevOps and security, software developers will be able to produce more secure applications and infrastructures.
Posted: 22 Nov 2016 | Published: 18 Nov 2016

SearchSecurity.com

Reduce Open Source Security Risk: Strategies, Tactics and Tools
sponsored by Rogue Wave Software
WHITE PAPER: Discover the tools and services you need to create an open source software (OSS) management strategy for your organization. Implementing an OSS strategy may take time, but when you consider the risks involved with unprotected OSS, it's easy to see the value it brings.
Posted: 22 Nov 2016 | Published: 31 Oct 2016

Rogue Wave Software

4 Strategies to Reduce Your Open Source Risk
sponsored by Rogue Wave Software
WHITE PAPER: Open source software is widely used by developers, but unfortunately, it's rarely created with things like troubleshooting, compliance, and security in mind. Access this white paper to explore how to enhance open source management and uncover 4 strategies that will reduce risk and improve open source audits.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

Rogue Wave Software

Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

Making DDoS Mitigation Part of Your Incident Response Plan - Critical Steps and Best Practices
sponsored by Akamai
WHITE PAPER: The time to prepare yourself for a DDoS attack was yesterday. Discover why distributed denial of service (DDoS) attacks are so damaging to organizations and understand what you can do to protect your company today.
Posted: 16 Nov 2016 | Published: 31 Oct 2016

Akamai

Deliver Instant Web Experiences While Protecting Your Applications
sponsored by Akamai
WHITE PAPER: In this white paper learn how to meet the rising expectations of the always connected, globally-distributed end-users by delivering faster website and mobile app responses. Discover how your enterprise can defend against all types of DDoS and web application attacks at a high accuracy, and more.
Posted: 14 Nov 2016 | Published: 14 Nov 2016

Akamai

The Security Champion's Guide to Web Application Security
sponsored by Akamai
WHITE PAPER: Learn about web application firewalls (WAFs) and how to apply them effectively such as considering whether a WAF is appropriate for your web application security, how to baseline your existing WAF against a set of recommended criteria, generate ideas for extending an existing WAF and improving web application security, and more.
Posted: 14 Nov 2016 | Published: 14 Nov 2016

Akamai

A Step-By-Step Guide to Improving Application Insight
sponsored by Splunk
RESOURCE: In this getting started guide, discover how you can use Splunk software to better manage your enterprise's apps to ensure uninterrupted uptime, smooth out hiccups in performance, and more. Learn what causes these issues, common solutions, and more advanced approaches that can save your organization time, money, and effort.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

Splunk

Heat Map: 2016 IoT Research Shows Areas of Biggest Impact On Digital Business
sponsored by Cloudera
ANALYST REPORT: Discover a "heat map" in which Forrester illustrates IoT trends and areas of biggest impact on digital businesses. Download to uncover the impact of IoT app deployment, compare your organization to others, and find business-led use cases.
Posted: 09 Nov 2016 | Published: 14 Jan 2016

Cloudera

Effectively Manage Application Security Risk in the Cloud
sponsored by IBM
WHITE PAPER: Discover why application security is so important, why organizations struggle to achieve it and what effective application security looks like.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

IBM

Cloud IAM TCO Assessment: How Much Could You be Saving?
sponsored by IBM
WHITE PAPER: This guide helps you compare and contrast the TCO of on-premise IAM with cloud-based IAM to effectively show your board the financial differences between the two.
Posted: 07 Nov 2016 | Published: 30 Nov 2016

IBM

Using Metrics to Manage Your Application Security Program
sponsored by Veracode, Inc.
WHITE PAPER: This SANs resource help you measure your application security (AppSec) program and ensure AppSec is part of your organization's culture moving forward.
Posted: 07 Nov 2016 | Published: 31 May 2016

Veracode, Inc.

Assessing Application Security: A Buyer’s Guide
sponsored by Veracode, Inc.
WHITE PAPER: In this SANs guide, learn the four-step method for acquiring the services you need to support a comprehensive application security (AppSec) lifecycle security program. Discover what goes into an effective AppSec team and how to acquire the resources necessary for deployment.
Posted: 07 Nov 2016 | Published: 31 May 2016

Veracode, Inc.

Top 5 Reasons Why You Need an AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: A variety of misconceptions lead to the lag in AppSec adoption, but the reality is you need an AppSec program. Learn the top 5 reasons why in this white paper.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

The Platform Transformation: How IoT Will Change IT and When
sponsored by PTC
EBOOK: This O'Reilly Media report explores key considerations for future-proofing elements of the IT stack and smoothing the transition to IoT components. Discover how IoT initiatives are expected to affect various layers of the IT stack, including data management, APIs, IoT apps, analytics, and more.
Posted: 07 Nov 2016 | Published: 17 Aug 2016

PTC

Your Guide to Securing Office 365
sponsored by MobileIron
WHITE PAPER: Learn how to employ a security model focused on mobile device deployment of Office 365. Discover how to distribute apps securely, protect app data-at-rest on the device, protect app data-in-motion to back-end services, and more.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

MobileIron
1 - 25 of 815 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement