IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
26 - 50 of 757 Matches Previous Page  |  Next Page
What's Trending in Retail and Mobile Technology
sponsored by SOTI Inc.
EBOOK: 84% of shoppers surveyed want to see more location-based technology. Access this e-book to learn how in-store mobile technology is shaping the future of retail. Discover the role the Internet of Things will play in future retail and what this means for e-commerce.
Posted: 05 Jan 2017 | Published: 30 Dec 2016

SOTI Inc.

Why RAD is Right for Mobile and Web Front-End Development
sponsored by OutSystems
WHITE PAPER: Discover how to deliver agile, responsive front-end applications with rapid app development (RAD). Read on to meet today's dramatically digital customer journey by upgrading your legacy stacks and mobile app strategy, learning how to overcome the challenges in adopting an open-source stack, and more.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

OutSystems

Trustwave Global Security Report
sponsored by SingTel
WHITE PAPER: Discover in-depth analysis and organized statistics from breach investigations, incident reports and vulnerability research from around the world. Use this report as a business plan to learn what cybercriminals are plotting now and what you could face in the future.
Posted: 04 Jan 2017 | Published: 31 Dec 2016

SingTel

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Manage Risk by Protecting the Apps and Data that Drive Business Productivity
sponsored by Citrix
WHITE PAPER: Traditional perimeter-based security has been rendered ineffective by mobility and the cloud. In this infographic, learn how to successfully navigate the increasingly volatile IT business environment and take a new approach to information security.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Protecting the 3 Areas of Secure Mobility
sponsored by BlackBerry
WHITE PAPER: Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.
Posted: 20 Dec 2016 | Published: 30 Nov 2016

BlackBerry

Virtualize Skype for Business for Secure Unified Communications
sponsored by Citrix
RESOURCE: Did you know that when virtualized, sensitive chat logs and file exchanges are securely stored in the datacenter? Learn how to establish a secure foundation for collaboration by virtualizing Skype for Business—providing the control and infrastructure visibility you crave for VDI.
Posted: 19 Dec 2016 | Published: 19 Dec 2016

Citrix

How to Identity Web Threats in Real-Time
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover how you can achieve real-time web protection and dynamic malware scanning in your existing security infrastructure. Learn how you can quickly enforce network access policies, instantly report on web threats and user activity, and more.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Symantec & Blue Coat Systems

Secure and Accelerate User Access to Web Applications
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to secure and accelerate web applications using Web Application Firewall (WAF) deployments in trusted and untrusted web environments. Deliver the fast, latency-free web experience users expect from anywhere and to any device.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Symantec & Blue Coat Systems

Deliver Complete Security for Enterprise Web Applications
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to fully protect web applications without adversely affecting web performance for your users. Address all of today's critical web vulnerabilities while at the same time accelerating web applications for optimal productivity.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Symantec & Blue Coat Systems

3 Ways to Migrate SAP to Microsoft Azure
sponsored by Freudenberg IT
WHITE PAPER: Business agility, innovation, cost reductions, scalability, and shadow IT: These 5 critical areas can be largely impacted and improved upon by leveraging cloud services and SaaS. Explore 3 ways to bring these benefits to SAP management by hosting mission-critical SAP apps in the cloud with Microsoft Azure.
Posted: 09 Dec 2016 | Published: 31 May 2016

Freudenberg IT

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PODCAST: Tune into this podcast to hear from health IT industry leaders as they discuss how application virtualization is reshaping care delivery and improving IT security.
Posted: 01 Dec 2016 | Premiered: Nov 17, 2016

Citrix and Pure Storage

Why DevOps + Security = A Bright Idea
sponsored by SearchSecurity.com
EBOOK: By combining DevOps and security, software developers will be able to produce more secure applications and infrastructures.
Posted: 22 Nov 2016 | Published: 18 Nov 2016

SearchSecurity.com

Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

Heat Map: 2016 IoT Research Shows Areas of Biggest Impact On Digital Business
sponsored by Cloudera
ANALYST REPORT: Discover a "heat map" in which Forrester illustrates IoT trends and areas of biggest impact on digital businesses. Download to uncover the impact of IoT app deployment, compare your organization to others, and find business-led use cases.
Posted: 09 Nov 2016 | Published: 14 Jan 2016

Cloudera

Effectively Manage Application Security Risk in the Cloud
sponsored by IBM
WHITE PAPER: Discover why application security is so important, why organizations struggle to achieve it and what effective application security looks like.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

IBM

Cloud IAM TCO Assessment: How Much Could You be Saving?
sponsored by IBM
WHITE PAPER: This guide helps you compare and contrast the TCO of on-premise IAM with cloud-based IAM to effectively show your board the financial differences between the two.
Posted: 07 Nov 2016 | Published: 30 Nov 2016

IBM

Assessing Application Security: A Buyer’s Guide
sponsored by Veracode, Inc.
WHITE PAPER: In this SANs guide, learn the four-step method for acquiring the services you need to support a comprehensive application security (AppSec) lifecycle security program. Discover what goes into an effective AppSec team and how to acquire the resources necessary for deployment.
Posted: 07 Nov 2016 | Published: 31 May 2016

Veracode, Inc.

The Platform Transformation: How IoT Will Change IT and When
sponsored by PTC
EBOOK: This O'Reilly Media report explores key considerations for future-proofing elements of the IT stack and smoothing the transition to IoT components. Discover how IoT initiatives are expected to affect various layers of the IT stack, including data management, APIs, IoT apps, analytics, and more.
Posted: 07 Nov 2016 | Published: 17 Aug 2016

PTC

Ultimate Guide to Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to work with appropriate teams to develop a clear application security strategy with concrete requirements for security policies. This, combined with selecting the right application security partners, can ensure your ability to create an advanced application security program that systemically reduces risk and enables innovation.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Trends and Tactics: How IT Professionals are Approaching AppSec Today
sponsored by Veracode, Inc.
WHITE PAPER: Discover the strategies and tactics being implemented by IT professionals to ensure the security of their applications. Learn the obstacles they're working everyday to overcome and devise a plan of your own to mitigate your app security hardships.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

2016 State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: This report provides you with tangible AppSec benchmarks with which to measure your own programs against. Discover stats and figures on the risk of applications and overall industry remediation trends.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Discover how to successfully integrate security with DevOps and learn 5 principles your security strategy must address. Furthermore, understand how DevOps and CI/CD are different from Agile development and how this difference changes the requirements for application security.
Posted: 02 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

Your Guide to Securing Office 365
sponsored by MobileIron
WHITE PAPER: Learn how to employ a security model focused on mobile device deployment of Office 365. Discover how to distribute apps securely, protect app data-at-rest on the device, protect app data-in-motion to back-end services, and more.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

MobileIron

Learn New Techniques For Preventing Data Loss In The Cloud
sponsored by Symantec & Blue Coat Systems
EGUIDE: This e-guide outlines the risks the cloud exposes modern enterprises to, and explores new options in cloud security like third-party cloud access security brokers (CASBs). Learn about several tools available that can let CIOs gain the visibility to prioritize cloud apps based on their security risk, and more.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

Symantec & Blue Coat Systems
26 - 50 of 757 Matches Previous Page    1 2 3 4 5    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement