IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
1 - 25 of 834 Matches Previous Page  |  Next Page
Don't Switch To Windows 10 Without An Endpoint Security Plan
sponsored by Thycotic
WHITE PAPER: According to the Thycotic 2017 BlackHat Report, 73% of hackers report that traditional anti-virus tools are irrelevant or obsolete, and don't adapt quickly enough to block emerging threats. This resource offers endpoint and application security strategies as well as tactics to enhance your Windows 7 and 10 security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Thycotic

Top 10 Keys to Successful Least Privilege Adoption
sponsored by Thycotic
WHITE PAPER: According to Thycotic, 85% of breaches involve compromised endpoints. Explore this resource to learn about endpoint attacks and strategies for enhanced endpoint and application security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Thycotic

CPaaS Market: Using CPaaS as a Route to Communication-Rich Applications
sponsored by Vonage
RESOURCE: In this resource, discover how enterprises are quickly becoming software companies to leverage APIs as the building blocks upon which to create their CPaaS platforms.
Posted: 19 Jan 2018 | Published: 14 Dec 2017

Vonage

Modernize HR Systems of Record for an Improved Employee Experience
sponsored by PowWow
WHITE PAPER: Find out how to simplify and extend critical business apps like those used by HR departments to mobile with a highly-visual, easy to use low-code platform.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

PowWow

A WhiteHat Sentinel Product Family Overview
sponsored by Whitehat Securities
WHITE PAPER: Read this white paper to learn how WhiteHat Sentinel, a SaaS product suite combines application scanning with one of the world's largest threat research team to provide you with 3 different types of analysis To ensure your apps are safe, no matter where they live.
Posted: 19 Jan 2018 | Published: 30 Dec 2016

Whitehat Securities

Discover Static Applications Security Testing for Microservices
sponsored by Whitehat Securities
WHITE PAPER: In the race to get to market, the last thing you want is to overlook the security of your microservices architecture. Don't leave your development process vulnerable. Click inside to learn about a Static Applications Security Testing (SAST) offering that allows you to ensure your microservices are as safe as possible.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Whitehat Securities

NEAT Evaluation for Applause Crowdtesting
sponsored by Applause
WHITE PAPER: Learn about Applause's crowdtesting platform for web, mobile, and IoT apps and find out if crowdtesting suits your development projects.
Posted: 19 Jan 2018 | Published: 31 Dec 2017

Applause

How Sunrun Secures & Monitors its Applications in Amazon ECS
sponsored by Sysdig
CASE STUDY: Implementing run-time security as well as monitoring tooling for your containerized and microservice based infrastructure are two very large challenges. What about getting visibility into your environment? This case study examines how to overcome these key challenges to better secure your environment and monitor your environment.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Sysdig

The DevSecOps Global Skills Survey
sponsored by Veracode, Inc.
RESEARCH CONTENT: This DevSecOps Global Skills Survey looks at the responses from 400 DevOps professionals on the state of DevOps workforces and education. Gain insight into how developers, IT ops, QA professionals, and even security view current DevOps and DevSecOps practices.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Veracode, Inc.

A Strategic Approach to Web Application Security
sponsored by Whitehat Securities
WHITE PAPER: App vulnerabilities originate with the source code, and you'll want to secure more of your source code in both development and production. But it's easier said than done for security pros to review source code continuously.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

Whitehat Securities

Getting the Board on Board with Application Security
sponsored by Whitehat Securities
WHITE PAPER: As a CISO, you need to make sure your business considers AppSec from the highest levels. Review these 4 recommendations to improve your business' AppSec and get the support you need.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

Whitehat Securities

Whitehat's Recent Offerings Put Security Expertise at the Developer's Fingertips
sponsored by Whitehat Securities
WHITE PAPER: Read through 451 Research's assessment of WhiteHat Scout and how the product broadens WhiteHat Securities' capabilities.
Posted: 17 Jan 2018 | Published: 06 Dec 2017

Whitehat Securities

The Art of Application Security: Getting Started with DevSecOps
sponsored by Whitehat Securities
WHITE PAPER: According to the Verizon DBIR, 60% of breaches involved web app attacks. Take a look at this white paper to discover best practices for application security as well as a case study example to prove the benefits of the application security best practices.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Whitehat Securities

Your Chance to Get It Right: Five Keys to Building AppSec into DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Watch this webcast to learn how to get app security pros involved in the collaborative DevOps culture by helping developers speak their language. You'll find 5 steps your company can take to achieving secure DevOps inside.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Veracode, Inc.

Unified MTD + MARS is the Best Practice for Mobile Security
sponsored by Lookout
WEBCAST: Download this webcast to understand the full mobile risk matrix and discover how mobile threat defense (MTD) combined with mobile app reputation services (MARS) can protect your organization from mobile threats to apps, devices, networks and more.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

Lookout

Case Study: Container Monitoring and Security
sponsored by Sysdig
EBOOK: Moving Docker into production is still equal parts art and science. Once your applications are in production you need to secure them. This case study shows how adopting Kubernetes and Docker will have a significant impact on your monitoring and security approach.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Sysdig

The ROI of AppSec: Getting your Money's Worth from your AppSec Program
sponsored by Veracode, Inc.
WEBCAST: Access this webcast to gain a better understanding of the impact of application security on the end-to-end software development value chain. Then, discover how much it really cost to fix security vulnerabilities in relation to application development.
Posted: 16 Jan 2018 | Premiered: Jan 16, 2018

Veracode, Inc.

2017 Application Security Statistics Report
sponsored by Whitehat Securities
RESOURCE: According to the Verizon 2017 DBIR, 30% of total breaches reported involved attacks on web applications. This 60-page application security statistics report provides perspective on the present application security posture of hundreds of organizations, so that enterprises like yours can understand and improve their own security.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Whitehat Securities

Mobile Threat Report
sponsored by Lookout
WHITE PAPER: With mobile threats becoming increasingly sophisticated it's more important than ever for organizations to know what threats they face, and how those threats can cause data loss, compliance infringement, and brand reputation damage. Download this white paper to uncover the latest mobile threats to your organization.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Lookout

The Security Professional's Role in a DevSecOps World
sponsored by Veracode, Inc.
WHITE PAPER: Learn about the evolving role of security professionals in the world of DevSecOps, and find out where app security fits into the shifting app development paradigms created by DevOps cultural changes.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Veracode, Inc.

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: According to a recent Verizon study, 40% of confirmed data breaches resulted directly from web app attacks. Explore this white paper to uncover a 3-step guide to gaining a mature application security program to prevent falling victim to damaging data breaches.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Veracode, Inc.

Move Mission-Critical Workloads Into the Cloud
sponsored by AdvizeX Technologies
WHITE PAPER: With more enterprises looking to invest the majority of IT budgets in the cloud, you need a cloud platform built to address the unique needs of mission-critical applications including security, compliance, and guaranteed performance and service levels. Read on to learn more.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

AdvizeX Technologies

Worldwide Mobile Threat Management Security Software Vendor Assessment
sponsored by Lookout
ANALYST REPORT: The mobile security market is expanding and you need to know how to evaluate the different vendors. This IDC report discusses how you can go about your own evaluation process and breaks down one of the leading vendors as an example.
Posted: 12 Jan 2018 | Published: 29 Sep 2017

Lookout

The Business Case for Mobile Security
sponsored by Lookout
EBOOK: Mobility is the way of the future, so you need to protect your mobile devices. This e-book chapter presents the case for mobile security and how you can convince the different decision-makers that mobile threats are real and worth the investment to defend against.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Lookout

State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: According to this report the top 10 list of most common vulnerability categories in 2017 is strikingly similar to 2016. Information leakage was again the most prevalent, present in 66% of apps on initial scan. Inside this report, State of Software Security, uncover trends over time, benchmark performance, and identify best practices.
Posted: 12 Jan 2018 | Published: 28 Dec 2017

Veracode, Inc.
1 - 25 of 834 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement