IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
226 - 250 of 872 Matches Previous Page  |  Next Page
Flash Storage: Powering the Future of IT
sponsored by EOH IBM
WHITE PAPER: Flash storage not only provides the performance necessary to run next-generation applications – such as cloud, mobile and social systems, and data analytics – but also provides the security necessary to prevent data breaches. See how your enterprise can boost your competitive advantage by leveraging flash today.
Posted: 01 Jun 2016 | Published: 31 Jan 2015

EOH IBM

Protect Your APIs
sponsored by MuleSoft
WHITE PAPER: APIs have become a key part of business strategy for many organizations. But how can you ensure APIs provide the agility you want without risking costly data breaches? Discover how you can ensure your API is highly available while guaranteeing integrity and confidentiality of your information.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

MuleSoft

SAM, ISO 19770, and SAP License Management Challenges Explained
sponsored by Snow Software
WHITE PAPER: This white paper examines the importance of addressing SAP licensing within your SAM practices and offers insight into how to do it successfully. View now to learn more.
Posted: 14 Mar 2016 | Published: 16 Mar 2016

Snow Software

The Role of SAM in Information Security
sponsored by Snow Software
WHITE PAPER: Software asset management (SAM) provides an organization not just with the resources it needs to generate audit and reconciliation reports, but also to support information security initiatives. Learn ways information security can be more effectively addressed with the aid of SAM.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

Snow Software

The State of App Security
sponsored by MobileIron
WHITE PAPER: In this white paper, learn how to proactively approach mobile app security. Explore the features one mobile security option provides, including automated responses to threats like malware, integration to make existing security stack mobile-aware, and more.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

MobileIron

The Application Delivery Controller: Top 10 Checklist
sponsored by A10 Networks
WHITE PAPER: Access this checklist to uncover 10 capabilities that will allow you to take advantage of secured applications across the enterprise.
Posted: 25 Jan 2016 | Published: 30 Nov 2015

A10 Networks

World Quality Report 2015-16
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The annual World Quality Report examines the state of application quality and testing practices across multiple industries and geographies
Posted: 18 Jan 2016 | Published: 18 Jan 2016

ComputerWeekly.com

What to Look for in Next-Generation Firewalls
sponsored by SearchSecurity.com
EBOOK: This Buyer's Guide goes in-depth on the process of selecting the best next-generation firewall for your company and how to ensure your organization has a clear understanding of its security requirements in the modern threat landscape.
Posted: 09 Jun 2016 | Published: 06 Jun 2016

SearchSecurity.com

CISOs Are Under Mounting Pressure
sponsored by MASERGY
ANALYST BRIEF: CISOs need help. The smart ones are turning to a new way of thinking about cybersecurity protection: Security as a Service. It's a managed, unified solution that leverages the power of both machine learning and expert human intelligence. Discover the scalability and speed SaaS can add to your organization.
Posted: 03 Jun 2016 | Published: 13 Jan 2015

MASERGY

TechTarget's Top 6 Security Measures for the Enterprise Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover a next-generation security model that moves away from traditional security tools. Learn how you can bring together all critical network security elements to provide an integrated security framework for your cloud-enabled enterprise.
Posted: 11 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

blinkbox Remediates Cloud App Security Challenges
sponsored by Barracuda Networks
VIDEO: In this video, you will learn about a VOD service called blinkbox and their struggles finding solid security for their cloud platform. See how they remediated their cloud application security issues and how they now operate without breach concerns.
Posted: 11 May 2016 | Premiered: 28 Oct 2014

Barracuda Networks

Controlling Data Center Security
sponsored by Barracuda Networks
WHITE PAPER: Learn how you can strengthen your data center perimeter firewall protection while enabling flexibility to allow for change in the future. Discover how to centrally control your data center security system to prevent it from weakening over time.
Posted: 06 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Three ways AirWatch secures mobile Office365 applications
sponsored by VMware
EGUIDE: This e-guide shows how you can better manage business applications on BYOD and corporate-owned mobile devices. Learn how to encrypt important organizational information and lock down apps across all personal, mobile devices.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

VMware

The Next Step in Mobility: Virtual Mobile Infrastructure
sponsored by Sierraware
EGUIDE: Virtual mobile infrastructure (VMI) is an emerging technology with a promising future that is going to change the way that mobile apps are run and utilized across different platforms. This exclusive guide, Brian Madden discusses what you need to know about VMI and what it means for the future of mobile devices.
Posted: 15 Apr 2016 | Published: 06 Apr 2016

Sierraware

Application Security: Evaluate Leading Testing Vendors
sponsored by IBM
WHITE PAPER: This Gartner resource compares 19 leading application security testing solution vendors, revealing the strengths and weaknesses of each one. View now and discover how the vendors performed in areas like product quality, sales execution and pricing, and customer experience.
Posted: 11 Mar 2016 | Published: 06 Aug 2015

IBM

It's time to tackle IoT security
sponsored by Ruckus Wireless
EGUIDE: The forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.
Posted: 09 Mar 2016 | Published: 07 Mar 2016

Ruckus Wireless

Tips to Secure your Virtualized Data Center
sponsored by TechData - Kaspersky
EGUIDE: This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

TechData - Kaspersky

IoT Poses New Problems for Developers
sponsored by TheServerSide.com
EBOOK: This expert handbook addresses three major issues posed by the IoT: security, analytics, and application testing. Uncover key insights on how to overcome these challenges and deliver secure, trustworthy, and valuable IoT devices.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

TheServerSide.com

Making the Case for Data-Aware Storage
sponsored by DataGravity
EGUIDE: This e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.
Posted: 01 Mar 2016 | Published: 23 Feb 2016

DataGravity

The Evolution of Network Security Hardware
sponsored by Aruba Networks
EGUIDE: This e-guide examines in detail how the basics of network security have changed since its inception. Learn about the 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months, and also how to make sure your Wi-Fi deployment is secure.
Posted: 01 Mar 2016 | Published: 24 Feb 2016

Aruba Networks

How to Overcome Middleware Security Risks
sponsored by Red Hat
EGUIDE: This expert e-guide provides a step-by-step process to secure middleware through application lifecycle management, network security, and security for specific middleware tools and interfaces. Also discover a case study about how the FAA exploited web-oriented open source middleware to improve integration and cut costs.
Posted: 26 Feb 2016 | Published: 22 Feb 2016

Red Hat

Prevent unauthorized database access with TDE
sponsored by Oracle Corporation
EGUIDE: This e-guide teaches you about Transparent Data Encryption (TDE) and how it prevents unauthorized personnel from accessing your database. You will learn how TDE encrypts data as it's written to storage and decrypts it when accessed by authorized users.
Posted: 23 Feb 2016 | Published: 16 Feb 2016

Oracle Corporation

Delivering high performing mobile applications with Cloud
sponsored by IBM
WEBCAST: In this webcast, you will discover how to leverage the cloud to continuously deliver high-performance mobile apps, and integrate these apps with your existing IT systems to source new avenues of revenue and transform your business.
Posted: 12 Feb 2016 | Premiered: Feb 12, 2016

IBM

Mobile App Q&A: Mobile Expert Talks Security and Testing
sponsored by InfoStretch
EGUIDE: This e-guide provides an in-depth question & answer session with mobile application lifecycle management expert Manish Mathuria about the biggest problems around mobile app security. Access critical advice on how to design your mobile app security testing process to catch issues before they lead to a breach you can't afford.
Posted: 05 Feb 2016 | Published: 28 Jan 2016

InfoStretch

EMM: Only One Ingredient in the Mobile Enablement Stew
sponsored by SearchMobileComputing
EBOOK: Enterprise mobility management (EMM) it isn't the end-all, be-all for mobility strategies. Every company starting a mobile initiative needs an extensive, tailor-made plan to meet its specific needs and goals. Read on to learn about the role EMM should play in your mobile strategy.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

SearchMobileComputing
226 - 250 of 872 Matches Previous Page    8 9 10 11 12 13    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement