IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
1 - 25 of 709 Matches Previous Page  |  Next Page
Security Operations in the Cloud
sponsored by TrendMicro
WHITE PAPER: This white paper discusses some best practices to adopt in securing workloads in Amazon Web Services.
Posted: 05 Feb 2016 | Published: 31 Jan 2016


Mobile App Q&A: Mobile Expert Talks Security and Testing
sponsored by InfoStretch
EGUIDE: This e-guide provides an in-depth question & answer session with mobile application lifecycle management expert Manish Mathuria about the biggest problems around mobile app security. Access critical advice on how to design your mobile app security testing process to catch issues before they lead to a breach you can't afford.
Posted: 05 Feb 2016 | Published: 28 Jan 2016

InfoStretch

The Top 8 Best Practices for Deploying XenApp and XenDesktop
sponsored by eG Innovations, Inc.
WHITE PAPER: In this white paper, you will discover how to improve the security and remote access of your virtual applications and desktops, and moreover access the top 8 best practices for Citrix XenApp/XenDesktop 7.x deployment. Learn how to separate databases for site configuration and logging by reading on now.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

eG Innovations, Inc.

Peer-to-Peer Peril: How Peer-to-Peer File Sharing Impacts Vendor Risk and Security Benchmarking
sponsored by BitSight
WHITE PAPER: BitSight recently observed the networks of 30,700 companies across all industries and found 23% of organizations were using the BitTorrent protocol for peer-¬to-¬peer file sharing. In this report you will learn which industries excel in mitigating the risks of file sharing, how P2P file sharing activity impacts security ratings and more.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

BitSight

Innovation Cubed: Security, Management and Productivity
sponsored by Microsoft
WHITE PAPER: This enterprise brochure highlights technology designed to help you respond to modern security and management challenges. Discover what intelligent mobile options for your employees and customers can do for your organization.
Posted: 03 Feb 2016 | Published: 03 Feb 2016

Microsoft

Ten Areas Where XenApp Outperforms VMware Horizon Apps
sponsored by Citrix
WHITE PAPER: In this white paper, you will discover the best-in-class features of one application virtualization platform, and compare its features to market equivalents. Read on to ensure virtualization solutions deliver rich experience for your users and comply with security regulations.
Posted: 02 Feb 2016 | Published: 31 Aug 2015

Citrix

Research Report: Enabling the Full Potential of New Operating Systems
sponsored by Microsoft
WHITE PAPER: This executive brief uses recent research to outline some of the challenges facing client computing, security, and compliance teams. Discover ways new capabilities - such as biometric authentications, universal application deployment, and a seamless app experience - demand a new generation of hardware to properly enable and support them.
Posted: 01 Feb 2016 | Published: 30 Oct 2015

Microsoft

5 Steps to Achieve Risk-based Application Security Management
sponsored by IBM
WHITE PAPER: This white paper will show you how to make applications security a strategically managed process.
Posted: 29 Jan 2016 | Published: 31 Jul 2015

IBM

The State of Mobile Application Security (4th Edition)
sponsored by IBM
WHITE PAPER: This white paper will give you the latest statistics of online piracy and show you what you can do to protect your IP.
Posted: 29 Jan 2016 | Published: 10 Dec 2015

IBM

How to Identify the Most Significant EMM Vendors to Date
sponsored by IBM
RESOURCE: In this report designed for I&O professionals, you will discover the 11 most significant EMM providers in the industry, and evaluate their offerings based on product capabilities, vendor strategy, and market reach. Access this exclusive report to differentiate vendors based on their data, app, and unified device management policies.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Deploy an Enterprise Mobility Gateway to Optimize Access Control
sponsored by F5 Networks
WHITE PAPER: In this white paper, you will learn how to scale, secure, and optimize control of your anytime, anywhere network, cloud, and application access. Read this paper to securely manage your workforce mobility and unburden your IT department and learn how to deliver seamless user access to all web-based resources.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

F5 Networks

The Application Delivery Controller: Top 10 Checklist
sponsored by A10 Networks
WHITE PAPER: Access this checklist to uncover 10 capabilities that will allow you to take advantage of secured applications across the enterprise.
Posted: 25 Jan 2016 | Published: 30 Nov 2015

A10 Networks

Update your current Apple and Oracle software now
sponsored by WatchGuard Technologies, Inc.
VIDEO: Watch this video to learn about the latest updates to Mac OSX, iOS 9 and Oracle patch that will keep your network secure.
Posted: 20 Jan 2016 | Premiered: 19 Jan 2016

WatchGuard Technologies, Inc.

Evaluating Standout Services in the Cloud Identity and Access Management Sector
sponsored by SecureAuth
WHITE PAPER: If you're to enforce strict identity management, you must shift your gaze to focus on both internal and external users that want to access apps running on-premise or in the cloud. In this report, you will focus your efforts on how to create strong authentication and risk-based access control empowered by cloud single sign-on.
Posted: 20 Jan 2016 | Published: 31 Mar 2015

SecureAuth

Security Breaks DevOps – Here’s How to Fix It
sponsored by CloudPassage
WHITE PAPER: This webcast presents the key ingredients your security strategy needs in order to secure and accelerate DevOps.
Posted: 20 Jan 2016 | Published: 14 Jul 2015

CloudPassage

How to Vet and Deliver Better Mobile App Security
sponsored by Kony
EGUIDE: This complimentary resource provides two articles direct from the experts at SearchSecurity.com on how to achieve better mobile app security. Learn how to design a mobile-app security policy and discover four steps for vetting and delivering secure mobile apps.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

Kony

Data Theft Prevention: The Key to Security, Growth and Innovation
sponsored by Forcepoint
WHITE PAPER: In this white paper, you will discover how Data Theft Prevention allows you to successfully embrace technological change and new opportunities.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

Forcepoint

World Quality Report 2015-16
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The annual World Quality Report examines the state of application quality and testing practices across multiple industries and geographies
Posted: 18 Jan 2016 | Published: 18 Jan 2016

ComputerWeekly.com

Desktops in the Mobile Age: Create a Mobile First Strategy
sponsored by VMware, Inc.
RESOURCE: In this resource, you will formulate a desktop management strategy that shifts critical business applications, operations, and processes to a mobile platform. Read on to evolve your business into a mobile-first enterprise and learn how to leverage the cloud for central management of apps and data.
Posted: 11 Jan 2016 | Published: 31 Oct 2014

VMware, Inc.

DevOps in Large Companies - Is It Possible?
sponsored by Apcera
WEBCAST: In this webcast, learn the how to transform culture to make DevOps possible and explore the role technology plays in the process. Explore recommendations for overcoming legacy systems, how to approach microservices and platforms as a service, the role policy plays, and more.
Posted: 08 Jan 2016 | Premiered: Dec 2, 2015


Special Report: The Risks of Shadow Data
sponsored by Elastica
WHITE PAPER: Based on the analysis of over 63 million documents, this report on shadow data provides valuable insights into cloud application usage to help organizations unlock the full business potential of cloud apps while staying secure and compliant.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

Elastica

Understanding Mobile Testing Strategies
sponsored by NTT Resonant
EGUIDE: QA consultant Gerie Owen has revealed key components that every mobile testing strategy should include. Read on and you'll also uncover what every mobile application tester must understand before developing a strategy of their own.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

NTT Resonant

Measure and Move Your Mobile Apps to Greatness
sponsored by IBM
WHITE PAPER: In this exclusive white paper, you will evaluate what turns consumers and other users both off and onto a mobile app, as well as learn how to elevate your serviceable and profitable mobile apps into great apps. Read on to discover four key findings that will elevate your apps.
Posted: 04 Jan 2016 | Published: 31 Oct 2015

IBM

How Risky Mobile Apps Steal Data and Spy on Users
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper explores the dangers of malicious mobile apps and gives you advice on avoiding them. Discover what threats are lurking in your users' app stores and how you can keep those threats out of your network.
Posted: 28 Dec 2015 | Published: 28 Dec 2015

Proofpoint, Inc.

Managing the Secure Deployment of Cloud Services
sponsored by IBM
WHITE PAPER: This white paper invites you to explore the possibilities of a SaaS-based approach to the secure deployment and use of cloud services. Access now and learn how to make it easier for business users to access sanctioned cloud services and introduce elements of identity and access management (IAM) that are often missing.
Posted: 22 Dec 2015 | Published: 27 Oct 2015

IBM
1 - 25 of 709 Matches Previous Page    1 2 3 4    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement