IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
126 - 150 of 875 Matches Previous Page  |  Next Page
Secure Coding Practices: Avoid SQL Injection
sponsored by WhiteHat Security
WEBCAST: SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.
Posted: 26 Jul 2017 | Premiered: Dec 31, 2016

WhiteHat Security

Your Guide to HIPAA Compliance for Containers
sponsored by Twistlock, Inc.
WHITE PAPER: With the advent of microservices it is likely that many new healthcare apps are being built with containers. Discover how to achieve compliance with the HIPAA Security Rule for containerized workloads for healthcare apps.
Posted: 20 Jul 2017 | Published: 20 Jul 2017


Total Cost of Ownership of the CloudBees Jenkins Platform
sponsored by Cloudbees
WHITE PAPER: Explore how to augment open source Jenkins software with CloudBees and foster DevOps practices within your organization. Learn more about the CloudBees Jenkins Platform, how it replaces the manual aspects of running Jenkins with automation, and the platform's total cost of ownership.
Posted: 18 Jul 2017 | Published: 31 Dec 2016

Cloudbees

Using the Pipeline Plugin to Accelerate Continuous Delivery
sponsored by Cloudbees
WHITE PAPER: Uncover an introduction and step-by-step guide for using the Jenkins Pipeline plugin to automate the software lifecycle and achieve continuous delivery. Access tips for everything from installing and creating a pipeline to scaling and securing it.
Posted: 18 Jul 2017 | Published: 31 Dec 2016

Cloudbees

How to Secure Your Organization's Data in SaaS Apps
sponsored by OneLogin
WHITE PAPER: According to Cisco, IT departments are only aware of about 7% of their company's cloud app usage, leading to a massive security blind spot. Discover 10 steps on how to track sensitive corporate data in third-party SaaS apps and ensure that only the right people have the right level of access to it.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

IAM Case Study: How to Maximize Your ROI and Security
sponsored by OneLogin
WHITE PAPER: Security and ROI don't have to be antagonistic. Learn how one company achieved a 482% ROI with their IAM over the course of three years, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

Supporting Open Source App Delivery Tools with Commercial Extensions
sponsored by Cloudbees
RESEARCH CONTENT: This Forrester Research report explores how to support open source delivery tools with commercial extensions. From an in-depth survey of 150 app development and IT professionals, uncover 3 key findings about app security and the state of open source tools in the software delivery pipeline.
Posted: 17 Jul 2017 | Published: 31 Oct 2016

Cloudbees

Solution Brief: Running Application Firewalls on Network Functions Platforms
sponsored by Array Networks
RESOURCE: Learn how two industry leaders are combining best-of-breed solutions in virtual application delivery and web application security to provide all the benefits of virtualization with the performance level of dedicated hardware appliances.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Array Networks

Deploying Java EE apps in cloud and container environments
sponsored by Red Hat
WHITE PAPER: Competitive companies are turning to DevOps, microservices, and containers to get the most from their Java apps. In this white paper, learn about Red Hat's fully-certified Java EE 7 application platform and how it was designed to be flexible enough to manage all these emerging priorities.
Posted: 05 Jul 2017 | Published: 05 Jul 2017

Red Hat

The Spectrum of Mobile Risk: Understanding the Full Range of Risks to Enterprise Data From Mobility
sponsored by Lookout
WHITE PAPER: Download this white paper to discover a mobile risk matrix that will help organizations understand the prevalence of mobile risk surrounding software vulnerabilities, mobile app threats, behavior and configurations and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Lookout

Building a World-Class Web Application Security Program
sponsored by Rapid7
CASE STUDY: Read this case study to learn the criteria that went into Microsoft's decision making process when buying their new web application vulnerability scanning system.
Posted: 08 Jun 2017 | Published: 08 Jun 2017

Rapid7

Application Security Buyers Guide: 15 Requirements
sponsored by Rapid7
WHITE PAPER: In this white paper, learn the 15 elements you need to make sure an application scanning vendor has before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Rapid7

7 Questions to Ask Your Dynamic Application Security Scanning Vendor
sponsored by Rapid7
WHITE PAPER: In this white paper, learn 7 questions you should ask any application security vendor about their dynamic application security testing (DAST) capabilities before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017

Rapid7

When Software Goes Rogue
sponsored by BDNA
WHITE PAPER: How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.
Posted: 02 Jun 2017 | Published: 31 May 2017

BDNA

Comprehensive Data Security In The Cloud
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, learn about some common cloud and SaaS application threats, as well as the 3 step guide to protecting your data in this new environment.
Posted: 30 May 2017 | Published: 30 May 2017

Palo Alto Networks

Safe Adoption of Cloud Applications
sponsored by Symantec
WHITE PAPER: Gartner predicts that nearly 40% of enterprise IT application spend will be shifted to cloud versus on-premise by 2020. Access this white paper for major considerations you will need to focus on when looking for cloud app security.
Posted: 26 May 2017 | Published: 26 May 2017

Symantec

Social Impact, Accelerated: How Your Nonprofit's Back Office Can Change The World
sponsored by NetSuite
WHITE PAPER: For most organizations, having a system that runs their business properly is essential for success. For nonprofit organizations, it's even more crucial. Inside, learn how nonprofits can use NetSuite, a cloud ERP and CEM technology, to tackle challenges including the "starvation cycle," properly handling donations and partnerships, and more.
Posted: 23 May 2017 | Published: 22 May 2017

NetSuite

Why You Need Advanced Application Services in Your Private Cloud
sponsored by F5 Networks
WHITE PAPER: The private cloud is being increasingly utilized to run virtual machines and mission-critical applications. The issue is that you need to support these apps with services, like security, that are not usually built-in. Access this white paper to learn the best ways to support your apps in the private cloud and maximize your resources.
Posted: 11 May 2017 | Published: 30 Dec 2016

F5 Networks

Build a Better Cloud
sponsored by F5 Networks
EGUIDE: This e-guide details common cloud migration challenges and will give you the foundation to support your technology as your business scales.
Posted: 09 May 2017 | Published: 09 May 2017

F5 Networks

Is the Endpoint Security Nightmare Ending?
sponsored by SearchSecurity.com
EBOOK: In our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

SearchSecurity.com

Mobile Apps Risk: Protect without Hindering Productivity
sponsored by Blue Cedar
EGUIDE: Mobile apps having a reputation for being notoriously unsecure. Discover the threat that mobile apps pose to your business, and some immediate security priorities for your enterprise to tackle when dealing with mobile apps.
Posted: 13 Jul 2017 | Published: 10 Jul 2017

Blue Cedar

Mobile Security Risk Mitigation and Tips for Success
sponsored by Blue Cedar
EGUIDE: Mobile is the new norm, putting mobile app security into the spotlight. In this e-guide discover a different method of approaching mobile security by focusing on data over device, as well as 12 specific tips to conquer mobile security and common problems.
Posted: 13 Jul 2017 | Published: 11 Jul 2017

Blue Cedar

5 Post-Hot Patch App Ban Risks and the Value of Security Assessments
sponsored by Blue Cedar
EGUIDE: Discover the value of application assessments when determining security risk, and 5 areas that need to be considered for enterprise app security in the face of Apple's decision to ban hot patches.
Posted: 13 Jul 2017 | Published: 11 Jul 2017

Blue Cedar

How to Resolve a Web Application Security Vulnerability
sponsored by Veracode, Inc.
EGUIDE: Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

Avoid Human Error with AWS CodeDeploy
sponsored by Splunk
EGUIDE: Want to avoid human error in code deployment? This e-guide covers how you can effectively use AWS CodeDeploy to automate code deployment to your servers and committing avoid manual errors.
Posted: 18 May 2017 | Published: 11 May 2017

Splunk
126 - 150 of 875 Matches Previous Page    4 5 6 7 8 9    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement