IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
226 - 250 of 829 Matches Previous Page  |  Next Page
The Finer Points of Embedded Software and IoT
sponsored by SearchSOA.com
EGUIDE: This expert e-guide provides 3 articles on embedded software and Internet of Things (IoT) strategies. Discover critical advice that can help you securely develop and manage embedded software in the cloud age, implement an IoT security strategy, and conquer the application integration challenges posed by IoT.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

SearchSOA.com

Verifying the integrity of open source Android apps
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how researchers can determine whether an app was built from its published source code.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ComputerWeekly.com

Clustering to counter Android malware
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how the rapid growth of new Android malware calls for automated tools to help malware analysts.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ComputerWeekly.com

Combating Android app repackaging attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how apps repackaged through reverse engineering pose a big security risk to the Android smartphone operating system.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ComputerWeekly.com

Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: This in-depth white paper can help you discover the latest security threats and how to stop them.
Posted: 26 Feb 2015 | Published: 31 Dec 2014

Dimension Data

Application Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn about new app security tools you can use to vet open source libraries and manage security vulnerabilities.
Posted: 03 Feb 2015 | Premiered: 02 Dec 2014

SearchSecurity.com

What if your App Virtualization Solution Didn't Support Location-Based Security?
sponsored by Dell, Inc. and Intel®
VIDEO: In this video, Brian Madden faces what happens if application virtualization solutions doesn't support location-based security.
Posted: 19 Jan 2015 | Premiered: 19 Jan 2015

Dell, Inc. and Intel®

The Global State of Enterprise Mobility 2014/15
sponsored by ComputerWeekly.com
RESEARCH CONTENT: An exclusive look at where buyers are investing in enterprise mobility and the drivers behind the market.
Posted: 05 Jan 2015 | Published: 05 Jan 2015

ComputerWeekly.com

Learn About Firewall Planning and Design
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper highlights a set of guidelines that can be used to create an overall security policy for your organization.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Juniper Networks, Inc.

The PaaS Payoff: Greater Agility, Less Cost
sponsored by Red Hat
WHITE PAPER: This exclusive report points to research from UBM Tech that reveals how many IT decision makers are addressing these challenges with the help of Platform as a Service (PaaS). Learn more about the top reasons why organizations are harnessing PaaS, and why it is becoming the go-to strategy for modern business.
Posted: 07 Nov 2014 | Published: 31 Aug 2014

Red Hat

Closing the Hacker's Open Door: Strengthening Mobile & App Security
sponsored by IBM
WEBCAST: In this webcast, learn how to stop apps with malware signatures before they find their way onto your network.
Posted: 05 Mar 2015 | Premiered: Jan 7, 2015

IBM

Mobile App Security: All You Need to Know
sponsored by Maas360 by IBM
WEBCAST: This webcast helps mobile application developers embed enterprise-grade security in their applications.
Posted: 25 Feb 2015 | Premiered: Feb 25, 2015

Maas360 by IBM

Apps to the Future: Predicting Enterprise Mobility in 2015
sponsored by Maas360 by IBM
WEBCAST: This webcast dives into the future of mobile enterprise apps as Fiberlink's own Director of Marketing, Jonathan Dale, is joined by IDC's VP for mobility research, John Jackson for a discussion on enterprise app predictions in 2015, and to share advice for mobile success in 2015. Read on to learn more.
Posted: 24 Feb 2015 | Premiered: Feb 24, 2015

Maas360 by IBM

The Security Value of a Dozen Next Generation Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: A security research group has put together an info-graphic that summarizes the results of independent studies on a dozen different NGFW products.
Posted: 18 Feb 2015 | Published: 30 Sep 2014

Cisco Systems, Inc.

Test Results for a Next Generation Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this detailed white paper, discover test results that reveal the true performance of a leading next generation firewall.
Posted: 17 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

One Great Firewall Analyzed in Depth
sponsored by Cisco Systems, Inc.
WHITE PAPER: This detailed white paper gives you all the information you need about a firewall that's stable, reliable, and able to block over 99% of threats.
Posted: 17 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Application Security in the Age of Cloud, BYOD, and SaaS
sponsored by BitGlass
WHITE PAPER: This white paper considers the features and benefits of one application security system that promises to deliver when it comes to securing an ambiguous infrastructure. Read on to see what you can do to wrangle in BYOD, SaaS, and cloud security protocols.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

BitGlass

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Why Mobile Needs A Four-Tier Engagement Platform
sponsored by Kony
WHITE PAPER: Access this in-depth Forrester research report to discover why mobile needs a four-tier engagement platform. Read on to discover the 4 steps to take toward the four-tier engagement architecture.
Posted: 01 Dec 2014 | Published: 01 Dec 2014

Kony

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.

API and API Infrastructure Security for the CSO
sponsored by Apigee
WHITE PAPER: Security must be built into the APIs themselves. But that's not enough. Threat protection, identity services, infrastructure security, and compliance also must be top of mind. This eBook provides a framework to help CSOs and CISOs consider API security.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

Apigee

HP Security Cyber Risk Report
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise

Tesco Uses CA Solutions to Monitor, Manage and Grow Their Business
sponsored by CA Technologies.
WEBCAST: Tesco, a global bank, was looking to implement an easy, customer-friendly authentication manager for their online customers. View this concise video now to find out what benefits Tesco is enjoying with this authentication system, and if a solution like this is right for your company.
Posted: 07 Nov 2014 | Premiered: Nov 7, 2014

CA Technologies.

What to Look for in Web Application Firewall Products
sponsored by SearchSecurity.com
EBOOK: In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

SearchSecurity.com

Overcoming the Challenges of Internal API Programs
sponsored by Intel® Services
WEBCAST: Modernizing legacy applications can be handled gracefully when the right API system is considered from the very beginning. View this webcast now to find out how to overcome cultural obstacles in implementing an internal API program, and how to present the value of having such a program.
Posted: 04 Nov 2014 | Premiered: Nov 4, 2014

Intel® Services
226 - 250 of 829 Matches Previous Page    8 9 10 11 12 13    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement