IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
101 - 125 of 876 Matches Previous Page  |  Next Page
Best-of-Breed Enterprise Mac Management
sponsored by JAMF
WHITE PAPER: Download this white paper to discover a full Mac client management tool built to support the underlying architecture of macOS from the ground up, that gives IT administrators the flexibility to gather inventory data in a way that's extendable and customizable, integrated, actionable and auditable.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

JAMF

Simplify Authentication with Personal Identity Verification
sponsored by HID Global
VIDEO: It's no secret that passwords are a pain for users and IT. This video discusses how personal identity verification (PIV) can make authentication simpler for your users.
Posted: 11 Aug 2017 | Premiered: 11 Aug 2017

HID Global

Remedying the Email Security Gaps in Microsoft Office 365
sponsored by Mimecast
WHITE PAPER: Discover how to protect your organization from security risks, data loss, and business continuity skills while using Microsoft Office 365.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Mimecast

Black Hat Survey 2017
sponsored by Thycotic
RESEARCH CONTENT: At the Black Hat 2017 cybersecurity event, more than 250 hackers were surveyed on what works and doesn't work when it comes to protecting critical data. Learn insights from the survey in this report.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Thycotic

Top Insights and Resources from Google Cloud Next '17
sponsored by Google Cloud
EBOOK: Get the low-down on the highlights from Google's marquee cloud conference in San Francisco.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Google Cloud

Comparing Security Features: MobileIron and Microsoft Intune
sponsored by MobileIron
WEBCAST: This video describes the security differences between EMM tool MobileIron and MDM tool Microsoft Intune, comparing capabilities like encryption, secure data gateway, compliance, and more.
Posted: 07 Aug 2017 | Premiered: Apr 25, 2017

MobileIron

The Pitfalls and Promises of Authentication in the IoT
sponsored by iovation, Inc.
WEBCAST: Explore the current state of authentication for consumer IoT technologies. Learn authentication IoT guidance from CSA, Gartner, and OWASP, discover key security differences between industrial and consumer IoT, and more.
Posted: 07 Aug 2017 | Premiered: Aug 7, 2017

iovation, Inc.

Achieve GDPR Readiness with Secure App and Data Delivery
sponsored by Citrix
WHITE PAPER: A Ponemon Institute study finds that most organizations do not feel prepared for the requirements of the GDPR. Discover how you can meet GDPR compliance through application security, contextual access, and more.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Citrix

Secure Browsing: Common Gaps, Best Practices, and New Technology
sponsored by Citrix
WHITE PAPER: Are you prepared to protect your browsers from targeted attacks seeking to compromise your organization? Take an inside look at one strategy that can help you centralize and secure browsers.
Posted: 04 Aug 2017 | Published: 31 Dec 2016

Citrix

From Agile Development to DevOps to DevSecOps
sponsored by Veracode, Inc.
VIDEO: It seems like organizations are still being breached left and right by cyber threats. Watch this short video to learn about a security platform that will protect your application layer by providing an end-to-end platform, cloud-based scalability, and strategic support to make application security a top priority.
Posted: 04 Aug 2017 | Premiered: 04 Aug 2017

Veracode, Inc.

5 Strategies to Improve Your Security Posture
sponsored by Citrix
WHITE PAPER: Reducing business security risk, protecting sensitive customer data, and ensuring compliance with regulations and standards are priorities for all organizations. Explore 5 ways you can overcome these security challenges.
Posted: 02 Aug 2017 | Published: 31 Dec 2016

Citrix

Mobile Application Security: Discovering Leaks and Remediation
sponsored by WhiteHat Security
WEBCAST: 25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.
Posted: 27 Jul 2017 | Premiered: Jul 27, 2017

WhiteHat Security

Sleeping with the Enemy: Achieving Agility and Security with DevSecOps
sponsored by WhiteHat Security
WEBCAST: To address the faster release demands of Agile, explore DevSecOps and how it effectively improves the collaboration between development, security, and operations teams. Learn how to strive towards continuous security, integrate app security tools, address the growing role of infrastructure as code, and more.
Posted: 26 Jul 2017 | Premiered: Jun 28, 2017

WhiteHat Security

Secure Coding Practices: Avoid SQL Injection
sponsored by WhiteHat Security
WEBCAST: SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.
Posted: 26 Jul 2017 | Premiered: Dec 31, 2016

WhiteHat Security

Unified Endpoint Management for Dummies
sponsored by IBM
EBOOK: Learn about unified endpoint management (UEM) and how it helps you manage and secure the growing number of devices, apps, and data within your organization. Discover 5 core features of effective UEM, how to monitor endpoints and end-users, how to protect content and proprietary data, and more.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

IBM

Your Guide to HIPAA Compliance for Containers
sponsored by Twistlock, Inc.
WHITE PAPER: With the advent of microservices it is likely that many new healthcare apps are being built with containers. Discover how to achieve compliance with the HIPAA Security Rule for containerized workloads for healthcare apps.
Posted: 20 Jul 2017 | Published: 20 Jul 2017


Total Cost of Ownership of the CloudBees Jenkins Platform
sponsored by Cloudbees
WHITE PAPER: Explore how to augment open source Jenkins software with CloudBees and foster DevOps practices within your organization. Learn more about the CloudBees Jenkins Platform, how it replaces the manual aspects of running Jenkins with automation, and the platform's total cost of ownership.
Posted: 18 Jul 2017 | Published: 31 Dec 2016

Cloudbees

Using the Pipeline Plugin to Accelerate Continuous Delivery
sponsored by Cloudbees
WHITE PAPER: Uncover an introduction and step-by-step guide for using the Jenkins Pipeline plugin to automate the software lifecycle and achieve continuous delivery. Access tips for everything from installing and creating a pipeline to scaling and securing it.
Posted: 18 Jul 2017 | Published: 31 Dec 2016

Cloudbees

How to Secure Your Organization's Data in SaaS Apps
sponsored by OneLogin
WHITE PAPER: According to Cisco, IT departments are only aware of about 7% of their company's cloud app usage, leading to a massive security blind spot. Discover 10 steps on how to track sensitive corporate data in third-party SaaS apps and ensure that only the right people have the right level of access to it.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

IAM Case Study: How to Maximize Your ROI and Security
sponsored by OneLogin
WHITE PAPER: Security and ROI don't have to be antagonistic. Learn how one company achieved a 482% ROI with their IAM over the course of three years, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

Supporting Open Source App Delivery Tools with Commercial Extensions
sponsored by Cloudbees
RESEARCH CONTENT: This Forrester Research report explores how to support open source delivery tools with commercial extensions. From an in-depth survey of 150 app development and IT professionals, uncover 3 key findings about app security and the state of open source tools in the software delivery pipeline.
Posted: 17 Jul 2017 | Published: 31 Oct 2016

Cloudbees

Cyber security solutions from IBM
sponsored by IBM
WHITE PAPER: Government agencies rely on the Internet to store large amounts of data. As a result, internal and external threats are a growing concern for personal and valuable information. This informative white paper offers cyber security solutions to ensure protection.
Posted: 28 Aug 2017 | Published: 20 Jul 2012

IBM

Demo: Secure Browsing in the Cloud
sponsored by Authentic8, Inc.
VIDEO: Is your browser vulnerable to web-borne threats? Tune into this brief demo to get an inside look at a secure, virtual browser that runs in the cloud.
Posted: 02 Aug 2017 | Premiered: 21 Dec 2016

Authentic8, Inc.

The Requirements of a Secure Browser
sponsored by Authentic8, Inc.
VIDEO: Traditional web browsers weren't built with today's threats in mind, and the gaps in infrastructure are being exposed. In this brief video, learn the full requirements of a secure browser.
Posted: 02 Aug 2017 | Premiered: 09 Jun 2015

Authentic8, Inc.

Is the Endpoint Security Nightmare Ending?
sponsored by SearchSecurity.com
EBOOK: In our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

SearchSecurity.com
101 - 125 of 876 Matches Previous Page    3 4 5 6 7 8    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement