IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
201 - 225 of 830 Matches Previous Page  |  Next Page
Why Application Whitelisting Is Essential For Advanced Threat Defense
sponsored by Digital Guardian
WHITE PAPER: This webinar transcript explores the challenge of securing your endpoints from zero-day attacks and suggests application whitelisting as a solution.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Digital Guardian

Efficiently Develop and Deliver Mobile Apps and Services with the Cloud
sponsored by Oracle Corporation
WHITE PAPER: Mobile app users expect apps to be delivered faster than ever before. Learn how a mobile cloud service can support efficient, high-quality mobile application development. Explore a strategy that can enable you to quickly implement new APIs, leverage analytics to see an app's adoption rate, secure your mobile apps with authentication, and more.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Oracle Corporation

Developing, Deploying, and Monitoring Mobile Apps with the Cloud
sponsored by Oracle Corporation
WHITE PAPER: This white paper explores how you can streamline mobile application development with cloud services. Discover how to extend and secure your mobile apps, connect new mobile apps to existing integration and security services, deploy apps in the cloud while diagnosing performance and usage, and more.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Oracle Corporation

Bolstering Your Enterprise Mobility Security Strategy for Today's App Landscape
sponsored by Oracle Corporation
WHITE PAPER: This quick and easy guide outlines the benefits of employing enterprise mobility management (EMM) in your organization, and also highlights the particular risks facing BYOD users in the mobile app landscape.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Oracle Corporation

8 Security Issues to Avoid in Mobile App Development
sponsored by Kony
WHITE PAPER: This resource divulges the top 8 security issues that app developers need to watch in order to protect their users from phishing, malware, and more.
Posted: 22 Jul 2015 | Published: 22 Jul 2015

Kony

Top 10 Reasons MDM is just a Fad
sponsored by IBM
WHITE PAPER: This white paper debunks the top 10 misconceptions about mobile device management and security.
Posted: 16 Jul 2015 | Published: 16 May 2014

IBM

A Foundation for Next-Generation Datacenter and Cloud-Based Security
sponsored by Citrix
WHITE PAPER: Access this white paper to learn how to leverage an application delivery controller to secure your data center and ensure your applications are always available, optimized, and secured.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

Citrix

Don’t Let Security Technology Put the Brakes on DevOps
sponsored by CloudPassage
WHITE PAPER: This white paper explains how a cloud-based security and compliance platform can help you maintain strong security without sacrificing DevOps productivity.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

Secure Content Collaboration on the Go
sponsored by IBM
WHITE PAPER: This white paper discusses the dangers of mobile content sharing and gives advice on what you can do to make it secure.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

IBM

How to Make Android Work For Your Enterprise
sponsored by IBM
WHITE PAPER: This white paper walks you through how to customize the Android security and management capabilities to your company's mobile strategy.
Posted: 13 Jul 2015 | Published: 13 Jul 2015

IBM

ID and Access Management for Microsoft Applications
sponsored by HID
WHITE PAPER: This white paper outlines how you can prevent irreparable damage to your company from unauthorized users with real-time authentication. Read on to learn about how you can ensure your data is protected, and grant access to authorized users with the tap of a card for Microsoft applications on your desktop, tablet, or mobile device.
Posted: 09 Jul 2015 | Published: 09 Jul 2015

HID

Is it time for a DLP system in your enterprise?
sponsored by SearchSecurity.com
EBOOK: Data loss prevention technology is a mature security control whose role is growing as DLP systems are made to respond to mobile and cloud technology in the enterprise.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

SearchSecurity.com

Federated Access & Identity: The Keys to Securing Healthcare's Cloud
sponsored by Radiant Logic, Inc.
WEBCAST: In this webcast, examine how a federated identity service is the key to securing your cloud environment from the endpoint to the core.
Posted: 24 Jun 2015 | Premiered: Jun 2, 2015

Radiant Logic, Inc.

Untangling Work and Personal Data with Enterprise MAM
sponsored by SearchMobileComputing
EBOOK: This exclusive three-part guide explains how and why IT should use MAM to control enterprise applications. Read on here to see how your business can securely enable successful enterprise mobility, and get an inside look at an MAM comparison: app wrapping versus containerization.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

SearchMobileComputing

Securing the Mobile-First Experience
sponsored by HID
RESOURCE: This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.
Posted: 26 May 2015 | Published: 01 Apr 2015

HID

As Enterprise Mobility Usage Escalates, So Does Security Risk
sponsored by HID
WHITE PAPER: In this expert white paper, examine how to tame the mobile security beast through two-factor authentication and single-sign-on approaches. Continue reading to learn how other organizations are bringing harmony to the UX vs. IT security debate and other steps you can take to protect data and apps.
Posted: 18 May 2015 | Published: 08 May 2015

HID

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

10 New Rules for Mobile Strategy and Success
sponsored by Kony
WHITE PAPER: In this white paper, discover ten essential tips for creating an innovative, impactful mobile strategy.
Posted: 29 Apr 2015 | Published: 29 Apr 2015

Kony

Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

IBM

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Cybersecurity Lessons from 2014
sponsored by IBM
WHITE PAPER: In this special security report, discover what lessons can be learned from 2014's cyber-breaches to improve cybersecurity in 2015.
Posted: 17 Apr 2015 | Published: 31 Mar 2015

IBM

The Merry-Go-Round of Security Testing
sponsored by SearchSecurity.com
EBOOK: In this Insider Edition of Information Security, InfoSec pros will learn about the pros and cons of RASP, the runtime application self-protection method for secure software delivery.
Posted: 08 Apr 2015 | Published: 08 Apr 2015

SearchSecurity.com

Be a Web App Security Superhero
sponsored by SearchSecurity.com
EBOOK: To secure Web applications today means tuning protections using the latest in Web Application Firewalls, Runtime Application Self Protection and other more.
Posted: 07 Apr 2015 | Published: 07 Apr 2015

SearchSecurity.com

Automating App Blacklisting
sponsored by Veracode, Inc.
WHITE PAPER: This white paper explores how to roll out a BYOD strategy that includes both preventative and detective controls to fill in the vulnerability gaps.
Posted: 01 Apr 2015 | Published: 04 Feb 2015

Veracode, Inc.

Mobilizing Enterprise Apps Depends on Management Strategy
sponsored by SearchMobileComputing
EBOOK: This expert guide explains why staying ahead of mobile governance, mobile device management (MDM), and mobile application management (MAM) is critical for providing high-quality apps and increased productivity.
Posted: 26 Mar 2015 | Published: 26 Mar 2015

SearchMobileComputing
201 - 225 of 830 Matches Previous Page    7 8 9 10 11 12    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement