IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
176 - 200 of 820 Matches Previous Page  |  Next Page
How to Identify the Most Significant EMM Vendors to Date
sponsored by IBM
RESOURCE: In this report designed for I&O professionals, you will discover the 11 most significant EMM providers in the industry, and evaluate their offerings based on product capabilities, vendor strategy, and market reach. Access this exclusive report to differentiate vendors based on their data, app, and unified device management policies.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

The Application Delivery Controller: Top 10 Checklist
sponsored by A10 Networks
WHITE PAPER: Access this checklist to uncover 10 capabilities that will allow you to take advantage of secured applications across the enterprise.
Posted: 25 Jan 2016 | Published: 30 Nov 2015

A10 Networks

WatchGuard Security Center Blog
sponsored by WatchGuard Technologies, Inc.
RESOURCE: Learn more about HTTPS vulnerabilities in this short resource. You'll see examples of why HTTPS isn't bulletproof including how cybercriminals can use HTTPS for their own malicious purposes.
Posted: 20 Jan 2016 | Published: 19 Jan 2016

WatchGuard Technologies, Inc.

World Quality Report 2015-16
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The annual World Quality Report examines the state of application quality and testing practices across multiple industries and geographies
Posted: 18 Jan 2016 | Published: 18 Jan 2016

ComputerWeekly.com

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

The State of Mobile Security Maturity
sponsored by IBM
WHITE PAPER: In this white paper, discover the blurred lines between personal and professional use of mobile devices as well as the inherent risks enterprise mobility poses to data, apps, and networks.
Posted: 19 Oct 2015 | Published: 31 Dec 2014

IBM

Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 01 Oct 2015 | Premiered: May 12, 2015

WhiteHat Security

Bolster Your Web Application Security
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines how you can give your web applications the security they need, and protect against vulnerabilities or other threats.
Posted: 01 Oct 2015 | Published: 06 Jul 2015

WhiteHat Security

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

5 Days to Setting Up an Application Security Program
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines a five day guide to bolstering your app security strategy.  Access now to learn more.
Posted: 01 Oct 2015 | Published: 12 Jan 2015

WhiteHat Security

Integrating Security Across the Software Development Lifecycle (SDLC)
sponsored by WhiteHat Security
CASE STUDY: In this white paper, you will learn how to not only identify and remediate web app vulnerabilities, but to integrate security into the software development lifecycle (SDLC). Access now to learn more.
Posted: 01 Oct 2015 | Published: 03 Jan 2014

WhiteHat Security

Web Security: Fighting Off Zero Day Attacks
sponsored by WhiteHat Security
WEBCAST: Join web security guru Robert Hansen in this webinar for an in-depth explanation of the many vulnerabilities you may not have considered, and to discover how you can better protect your newly-built websites and applications. View now to learn how to stop attacks like Heartbleed, SQL injection, command injection, and more.
Posted: 01 Oct 2015 | Premiered: Apr 13, 2015

WhiteHat Security

Securing Apps from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 01 Oct 2015 | Published: 28 Oct 2014

WhiteHat Security

Programmatically Identifying Multi-Page Flaws in Web Apps
sponsored by WhiteHat Security
WHITE PAPER: This white paper details the pros and cons of several web app scanning approaches. View now to test your web apps' functions independently, automatically detect the presence of common nonce frameworks, and more.
Posted: 01 Oct 2015 | Published: 31 Dec 2013

WhiteHat Security

The Four Horsemen of Mobile Security
sponsored by Skycure
WEBCAST: In this webcast, hear from security professionals as they explore today's mobile threat landscape and describe alternative security strategies.
Posted: 03 Dec 2015 | Premiered: Jun 25, 2015

Skycure

Predictive Mobile Threat Defense
sponsored by Skycure
WHITE PAPER: This white paper explains the 3 reasons why traditional mobile security approaches can no longer protect users and organizations. Access this resource now to learn how to advance mobile security into a next-gen mobile threat defense to protect networks, apps, and users.
Posted: 03 Dec 2015 | Published: 11 Nov 2015

Skycure

Reimagine, Reinvent, Run: SAP in the Digitial Economy
sponsored by SAP America, Inc.
WHITE PAPER: This brief whitepaper discusses some of the ways SAP is changing how the world operates, with particular focus on efficiency. Access now to see how SAP could revamp your business as well.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

SAP America, Inc.

Ten Areas Where Citrix XenApp Outperforms Vmware Horizon
sponsored by Citrix
WHITE PAPER: VMware Horizon has left out some of the "no-brainer" features that Citrix XenApp users and admins have been using for years. Understanding the differences between these products is critical to selecting the right solution that satisfies user and IT requirements in your organization. Compare solutions now.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

Citrix

How to Ensure Success of Your Mobile App Development Projects
sponsored by IBM
WHITE PAPER: In this report, you will learn the best practices for successful mobile application development. Read on to make your mobile project shine with a checklist of project guidelines, as well as advice on how to enable flexible mobile app development platforms with cloud.
Posted: 11 Nov 2015 | Published: 11 Nov 2015

IBM

Don't Believe the Hype - All Containers are Not Equal
sponsored by Good Technology
WHITE PAPER: This white paper identifies various data leakage vulnerabilities and presents the questions IT needs to ask when choosing a containerization strategy.
Posted: 11 Nov 2015 | Published: 11 Jun 2015

Good Technology

Information Security Magazine: November Issue
sponsored by SearchSecurity.com
EZINE: What strategies are companies using to protect data against mobile security threats? In Information Security, we ask CISOs who have been there: What works?
Posted: 02 Nov 2015 | Published: 02 Nov 2015

SearchSecurity.com

Solidify Your Network Protection with Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper you will learn the ins and outs of deploying an ISFW. Learn how to protect your company from the latest advanced security threats and compartmentalize access to sensitive data and apps.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

The Changing State of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This report reveals just how often cloud environments are hacked and what methods are used when they are.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Alert Logic

Modern Mobility E-zine: In-App Analytics Get Down to Business
sponsored by SearchMobileComputing
EZINE: In this issue of Modern Mobility, delve straight into in-app analytics, and learn how the insights this technology provides will keep mobile applications on track. Access this exclusive e-zine now to learn more about mobile backend as a service, and how to build apps that connect to data center infrastructure.
Posted: 13 Oct 2015 | Published: 13 Oct 2015

SearchMobileComputing

What to Look for in Vulnerability Management
sponsored by SearchSecurity.com
EBOOK: This Buyer's Essentials guide helps InfoSec pros, like you, assess and purchase vulnerability management tools. It explains how they work and highlights key features you should look for.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

SearchSecurity.com
176 - 200 of 820 Matches Previous Page    6 7 8 9 10 11    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement