IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
26 - 50 of 841 Matches Previous Page  |  Next Page
Achieve security, flexibility and efficiency for your financial services organization with virtualization
sponsored by Citrix
WHITE PAPER: The need for greater security controls from IT without compromising business agility makes it essential for financial services organizations to move beyond traditional desktop management to centralized virtual app delivery. Read this white paper to discover how virtualization can enable faster and more secure access to apps and data.
Posted: 06 Sep 2017 | Published: 06 Sep 2017

Citrix

4 Facts about APIs: The Hidden Technology Powering the Internet
sponsored by Akamai Technologies
WHITE PAPER: In this resource, learn the 4 facts about APIs revealed in a recent survey completed by business leaders from over 400 leading technology companies.
Posted: 06 Sep 2017 | Published: 28 Feb 2017

Akamai Technologies

Does your Company have a Kill Switch?
sponsored by LogMeIn, Inc.
WHITE PAPER: Without a kill switch, there's no way to know you've secured your fortress. Read this white paper to uncover why your company should implement a password manager to protect your team's data.
Posted: 06 Sep 2017 | Published: 06 Sep 2017

LogMeIn, Inc.

Transform the branch office for high-touch, high-performance experiences
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how financial services organizations can optimize and secure the delivery of apps and desktops over any network connection, to any device, to support branch office workers and customer service.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Citrix

Southcoast Health System: A Case Study
sponsored by Citrix
WHITE PAPER: Protecting privacy in a growing, distributed and mobile environment is no easy task. This case study discusses how Southcoast implemented a secure mobile strategy that met diverse clinical, business, and security goals.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Citrix

Case Study: Maintaining Strong Security While Going Mobile
sponsored by Citrix
WHITE PAPER: In order to gain the productivity and cost benefits of going mobile, security needs to be factored in from the beginning. Learn from this case study and see how one healthcare organization used a secure mobility strategy to reduce the risk of potential HIPAA breaches, address request for BYOD support in less than two weeks, and more.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Citrix

VoIP Adoption Leads to Free PCI Upgrades for Major Quick Service Restaurant
sponsored by Hughes Network Systems
CASE STUDY: The case study uncovers how VoIP adoption helped a quick service restaurant address growing cyber challenges and increase their bandwidth for the best network connection.
Posted: 01 Sep 2017 | Published: 31 Mar 2017

Hughes Network Systems

Secure app and data delivery for a mobile financial services workforce
sponsored by Citrix
WHITE PAPER: Download this white paper to find out how one company provides a complete digital workspace that delivers secure access to apps, data and services from any device via any network while centralizing apps and data for simplified IT management.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Citrix

Enabling Secure Mobility: Explore 3 Case Studies
sponsored by Citrix
WHITE PAPER: This white paper explores technologies that enable organizations to maintain security, privacy and compliance while evolving their IT environment for mobility.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Citrix

Embrace Mobility Without Sacrificing Security
sponsored by Citrix
RESOURCE: This infographic takes a closer look into how you can embrace a digital, mobile experience without sacrificing security. Discover 4 best practices.
Posted: 31 Aug 2017 | Published: 31 Aug 2017

Citrix

Antimalware Protection and the Fundamentals of Endpoint Security
sponsored by OPSWAT inc
EGUIDE: In this expert e-guide, uncover the key features of endpoint antimalware protection, as well as how to deploy/manage endpoint antimalware tools.
Posted: 31 Aug 2017 | Published: 29 Aug 2017


'Hacking with Pictures': Stegosploit and How to Stop It
sponsored by OPSWAT inc
TECHNICAL ARTICLE: Take a closer look into Stegosploit, a type of malware that is inserted into certain extra-data sections of an image. Learn how image-borne malware works, which image formats can carry Stegosploit, and how to remove it.
Posted: 29 Aug 2017 | Published: 02 Aug 2017


As Learning Hinges On Devices And Applications, Challenges Increase For IT
sponsored by IBM
WHITE PAPER: Explore the importance of putting security measures in place to restrict apps, documents and data to specific users and groups, ensuring sensitive data does not end up in the wrong hands. Learn from the education industry on how endpoint management can help you achieve stronger data security.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

IBM

The Cloud Evolution: Top Security Challenges & How to Overcome Them
sponsored by AWS-Trend Micro
WHITE PAPER: Leverage Deep Security on AWS to adopt a DevSecOps culture, so your IT team can spend less time focusing on security and more developing your core business applications.
Posted: 24 Aug 2017 | Published: 25 Jul 2017

AWS-Trend Micro

Security Tech: Out with the Old in with the New
sponsored by Citrix
RESOURCE: Hackers love your outdated security tech. This new security infographic explores what's holding businesses back and what they need to do about it.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Citrix

Manage Risk by Protecting the Apps and Data That Drive Business Productivity
sponsored by Citrix
RESOURCE: Today you face the challenge of securing a business environment transformed by technologies such as cloud and new workforce requirements such as mobility, BYO and third-party talent. See why customers around the globe rely on Citrix to help them address the growing cybersecurity threats of today while preparing for future requirements.
Posted: 21 Aug 2017 | Published: 21 Aug 2017

Citrix

Best-of-Breed Enterprise Mac Management
sponsored by JAMF
WHITE PAPER: Download this white paper to discover a full Mac client management tool built to support the underlying architecture of macOS from the ground up, that gives IT administrators the flexibility to gather inventory data in a way that's extendable and customizable, integrated, actionable and auditable.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

JAMF

Access Management Handbook
sponsored by Gemalto
EBOOK: When each cloud app uses its own login information, it creates a hassle for both users and IT. This handbook offers information on access management, and authentication protocols integral to maintaining a simple and secure cloud environment.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

Gemalto

Simplify Authentication with Personal Identity Verification
sponsored by HID
VIDEO: It's no secret that passwords are a pain for users and IT. This video discusses how personal identity verification (PIV) can make authentication simpler for your users.
Posted: 11 Aug 2017 | Premiered: 11 Aug 2017

HID

End of Support Doesn't Have to Mean End of Security
sponsored by TrendMicro
WHITE PAPER: Does end of support mean end of security? Explore the security risks facing organizations running end of life (EOL) platforms like Windows Server 2003. Uncover 5 options to address those risks.
Posted: 11 Aug 2017 | Published: 31 Jul 2017

TrendMicro

Remedying the Email Security Gaps in Microsoft Office 365
sponsored by Mimecast
WHITE PAPER: Discover how to protect your organization from security risks, data loss, and business continuity skills while using Microsoft Office 365.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Mimecast

Black Hat Survey 2017
sponsored by Thycotic
RESEARCH CONTENT: At the Black Hat 2017 cybersecurity event, more than 250 hackers were surveyed on what works and doesn't work when it comes to protecting critical data. Learn insights from the survey in this report.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Thycotic

IDC Spotlight : Mercy Health Systems: Innovative Mobile Applications to Enhance Patient Care
sponsored by VMware
ANALYST REPORT: Mercy Health System in St. Louis embarked on a journey to improve the increasingly difficult-to-manage combination of corporate and personal devices as "bring your own device" (BYOD) became more popular. Download this IDC Spotlight to learn how Mercy was able to improve security of devices, improve satisfaction, and more.
Posted: 10 Aug 2017 | Published: 31 Mar 2017

VMware

Top Insights and Resources from Google Cloud Next '17
sponsored by Google Cloud
EBOOK: Get the low-down on the highlights from Google's marquee cloud conference in San Francisco.
Posted: 08 Aug 2017 | Published: 08 Aug 2017

Google Cloud

Cyber security solutions from IBM
sponsored by IBM
WHITE PAPER: Government agencies rely on the Internet to store large amounts of data. As a result, internal and external threats are a growing concern for personal and valuable information. This informative white paper offers cyber security solutions to ensure protection.
Posted: 28 Aug 2017 | Published: 20 Jul 2012

IBM
26 - 50 of 841 Matches Previous Page    1 2 3 4 5    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement