IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
101 - 125 of 844 Matches Previous Page  |  Next Page
Case Study: API Gateway Secures Public APIs and Minimizes Costs
sponsored by Axway
CASE STUDY: APIs can help enterprises roll out apps quickly, but exposing them to third parties can create security issues. Discover the API gateway that enabled the energy supplier First Utility to secure their publicly available APIs, optimize performance and scalability, and accelerate time to market.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

Axway

Solving the Top 11 API Threats
sponsored by Axway
WHITE PAPER: How can you ensure that APIs offer optimal functionality while minimizing their security vulnerabilities? Discover the 11 most critical API threats and the countermeasures that can help you thwart them.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

Axway

The Key to Protecting Your Business Amid Cybercrime’s Current Boom
sponsored by CA Technologies
WHITE PAPER: This white paper invites you to explore new vulnerabilities in our application-centric culture. Find relief as you uncover a simple-to-deploy, automated, proven strategy for privileged access management delivered in a single appliance protecting physical, virtual and cloud environments.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

CA Technologies

How Cloud Services Giant Exostar Protected Sensitive Data and Applications
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, you'll learn how micro-segmentation helps you move beyond perimeter security to contain and halt threats inside your data center in order to keep your data safe. Access now to learn whether a software-defined data center architecture is right for your business.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

VMware, Inc.

9 Best Practices to Build a Digital Business Architecture
sponsored by Axway
WHITE PAPER: APIs can help you leverage third-party development talent and encourage collaboration, but there are several security and performance issues you have to address in order to ensure responsible, effective use of APIs. Discover 9 best practices to optimize your digital business architecture with APIs.
Posted: 12 Apr 2016 | Published: 31 Dec 2015

Axway

IoT Security: Have You Addressed These 10 Critical Issues?
sponsored by Axway
WHITE PAPER: Access a checklist of 10 critical Internet of Things security issues you need to address. Learn how to overcome challenges in areas like protocol proliferation, access keys, patching, and 7 more.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

Axway

20 Ways to Better Deliver, Manage, & Secure APIs
sponsored by Axway
WHITE PAPER: In today's increasingly mobile world, organizations need to use APIs to provide customers and employees consistent access to business services and data anytime, anywhere, from any device. Discover 20 ways a unified API platform can allow you to accelerate API delivery.
Posted: 08 Apr 2016 | Published: 08 Apr 2016

Axway

Comprehensive Network Security Building Blocks
sponsored by Cogeco PEER 1
WHITE PAPER: To protect your network, users and data, you need to build the foundation for robust security to withstand today's attacks. Access this white paper now and find out how to boost the efficiency of your network perimeter and remote access security, application security, regulatory compliance, and more.
Posted: 05 Apr 2016 | Published: 09 Mar 2016

Cogeco PEER 1

Moving Beyond MDM: Why Legacy Mobile Security Products Don’t Work
sponsored by Sierraware
WHITE PAPER: As organizations embrace BYOD, they need todevelop a strategy to protect corporate data and satisfy compliance while supporting a broad array of mobile devices and apps. Discover how a virtual mobile infrastructure can solve many BYOD security problems.
Posted: 05 Apr 2016 | Published: 30 Mar 2016

Sierraware

The Human Risk Factor Infographic
sponsored by Proofpoint, Inc.
WHITE PAPER: This brief infographic lists the 9 things you need to know about human error exploits today and offers defensive insight to protect your organization and users.
Posted: 01 Apr 2016 | Published: 23 Mar 2016

Proofpoint, Inc.

Security for the Internet of Things: Identifying Your Weakest Links
sponsored by Microsoft
WHITE PAPER: 70% of the most commonly used Internet of Things (IoT) devices today are vulnerable to attack. Access this brief resource to learn more about the security risks posed by the IoT. Discover key tips on how to fortify your data, devices, and connections from attacks.
Posted: 30 Mar 2016 | Published: 30 Mar 2016

Microsoft

Security for the Internet of Things: Upcoming Trends to Watch
sponsored by Microsoft
RESEARCH CONTENT: By 2020, over 25% of identified attacks in enterprises will involve the Internet of Things (IoT). In this resource, Gartner's IoT security analysts offer predictions for upcoming market trends and recommendations about which security services are worth the investment.
Posted: 23 Mar 2016 | Published: 09 Dec 2015

Microsoft

Consolidating and Protecting Virtualized Enterprise Applications with EMC XtremIO
sponsored by EMC XtremIO
WHITE PAPER: This white paper describes the components, design, functionality, and advantages of hosting a VMware-based, multi-site virtual server infrastructure consisting of consolidated, virtualized enterprise applications on the EMC XtremIO All-Flash array.
Posted: 22 Mar 2016 | Published: 22 Mar 2016

EMC XtremIO

The Platform of Platforms for the Internet of Things
sponsored by IBM
WHITE PAPER: How can you choose a comprehensive Internet of Things (IoT) platform out of all of the options on the market? Access this resource to discover the 5 key elements to an effective IoT platform, including application management, analytics, and 3 more.
Posted: 22 Mar 2016 | Published: 29 Feb 2016

IBM

Internet of Things: Overcoming New Security Challenges
sponsored by IBM
WHITE PAPER: As threats targeting connected devices continue to grow, Internet of Things (IoT) systems need a way to function securely even when one or more devices have been compromised. Discover best practices for IoT security throughout the system lifecycle, from development through to operations and maintenance.
Posted: 22 Mar 2016 | Published: 30 Apr 2015

IBM

Getting a handle on mobile devices – securely, reliably and tidily
sponsored by Matrix42
WHITE PAPER: Mobile access to data and applications is now the rule rather than the exception. This trend has notably spurred thegenesis of both web and SaaS applications, which are used on a daily basis by allcompanies of all sizes nowadays. This technological progress is confronting both IT professionals and ordinary users with new problems.
Posted: 18 Mar 2016 | Published: 30 Dec 2015

Matrix42

How to Choose an IT Platform to Empower Your Internet of Things
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This resource describes how to adapt your organization's human resources, processes, and architectures to derive maximum value from the Internet of Things (IoT). Discover the criteria you need to consider when establishing an IoT platform, including connectivity between devices and data, security and governance, big data analytics, and 2 more.
Posted: 16 Mar 2016 | Published: 31 Dec 2015

Hewlett-Packard Enterprise

App and Threat Intelligence Defense Strategy Revealed
sponsored by Ixia
WHITE PAPER: In this white paper, delve deeper into app and threat intelligence defense strategies to mitigate hacker attempts to break through your vulnerabilities.
Posted: 15 Mar 2016 | Published: 25 Nov 2015

Ixia

Covering the Security Aspect of Software Asset Management
sponsored by Snow Software
WHITE PAPER: Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.
Posted: 14 Mar 2016 | Published: 09 Dec 2015

Snow Software

Uncovering the Risk of SAP Cyber Breaches
sponsored by Onapsis
WHITE PAPER: Access this SAP research paper to understand the threat of an SAP cyber breach and how organizations are managing the risk of information threat, modification of data and disruption of business processes. Learn from businesses that have been breached an average of two times in the past 24 months.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Onapsis

Addressing Security Vulnerabilities in Embedded Applications
sponsored by Programming Research
WHITE PAPER: This resource explains why it's so difficult to produce secure embedded software and provides best practices for embedded developers. Discover how you can minimize exploitable software vulnerabilities, cut costs, and speed up development with automated static analysis.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

Programming Research

Developing Secure Embedded Software: Quality Doesn't Equal Security
sponsored by Programming Research
WHITE PAPER: This white paper debunks 4 common misconceptions about software security and describes a variety of tools to improve embedded software security by detecting issues earlier on in development. Learn about the benefits of strategies like risk and threat management, application lifecycle management, static code analysis, and more.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

Programming Research

Application Security: Evaluate Leading Testing Vendors
sponsored by IBM
WHITE PAPER: This Gartner resource compares 19 leading application security testing solution vendors, revealing the strengths and weaknesses of each one. View now and discover how the vendors performed in areas like product quality, sales execution and pricing, and customer experience.
Posted: 11 Mar 2016 | Published: 06 Aug 2015

IBM

How IoT Is Making Security Imperative for All Embedded Software
sponsored by Programming Research
WHITE PAPER: This resource discusses the unique challenges of securing embedded applications and explains how to overcome these obstacles with static code analysis tools. Discover how you can identify and eliminate defects earlier on in the development cycle.
Posted: 10 Mar 2016 | Published: 10 Mar 2016

Programming Research

As Attackers Target Application Coding Errors, Are Static Analysis Tools the Answer?
sponsored by Programming Research
EGUIDE: This expert e-guide discusses the pros and cons of static code analysis tools for application security. Inside, discover the 5 most common and insidious threats to application security and gain access to expert articles on how to counter them.
Posted: 10 Mar 2016 | Published: 07 Mar 2016

Programming Research
101 - 125 of 844 Matches Previous Page    3 4 5 6 7 8    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement