IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
26 - 50 of 781 Matches Previous Page  |  Next Page
2017 Study on Mobile and IoT App Security
sponsored by IBM
RESEARCH CONTENT: According to this Ponemon Institute study, 58% of respondents are slightly more concerned about getting hacked through an IoT app than a mobile app. This research report reveals how many companies are unprepared for the risks created by vulnerabilities in IoT apps.
Posted: 20 Feb 2017 | Published: 31 Jan 2017

IBM

10 Key Findings From the Ponemon Institute’s Mobile & IoT Application Security Testing Study
sponsored by IBM
WHITE PAPER: This article reveals 10 key findings from Ponemon's "2017 State of Mobile & Internet of Things (IoT) Application Security Study."
Posted: 17 Feb 2017 | Published: 17 Feb 2017

IBM

IT Project ANZ: App Development
sponsored by ComputerWeekly.com
EGUIDE: In this guide, we show you some of the technologies helping in-house IT teams to release and deploy new applications as swiftly as possible, without disrupting business operations. From Software as a Service to DevOps and containers, Australia/New Zealand-based organisations are beginning to embrace these flexible and agile approaches.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

ComputerWeekly.com

Enterprise Mobility Management Helped Arrow International Improve Mobile Security And Workforce Productivity
sponsored by IBM
CASE STUDY: The New Zealand construction company Arrow International needed a way to manage and secure their mobile apps. This case study highlights how adopting a mobility management system granted them that security, as well as intellectual property protection, decreased app deployment time, and more.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

IBM

Enterprise Mobility Platform with Enterprise-Grade Security
sponsored by PowWow
WHITE PAPER: Explore how to accelerate mobile development, connect new apps to third party data sources and APIs, and modernize any enterprise app or workflow. Discover how to leverage existing APIs and containers to design, build, and deploy personalized, intelligent, and secure apps that run anywhere, on any device, and on any OS.
Posted: 16 Feb 2017 | Published: 31 Dec 2016


Manage Application Security Risks to Help Protect your Organization’s Critical Data
sponsored by IBM
WHITE PAPER: Effective application security is really a matter of managing risk. Learn how to develop application security when you build an asset inventory, assess the business impact, and 3 more ways to mitigate risks to your most crucial assets.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

IBM

IT Project ASEAN: App Development
sponsored by ComputerWeekly.com
EGUIDE: In this guide, we show you some of the technologies helping businesses to release and deploy new applications as swiftly as possible, without disrupting business operations. From containers to microservices and DevOps, many organizations are now embracing these flexible and agile approaches.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

ComputerWeekly.com

Securing the Most Important Apps and Data—Yours
sponsored by Citrix
RESOURCE: Discover a digital workspace that promotes exceptional user experience by delivering apps, data, and complete desktops available on any device, over any network. Read on to empower seamless, secure, and productive work that flexes for your workloads (whether on-premises, cloud, or hybrid).
Posted: 26 Jan 2017 | Published: 26 Jan 2017

Citrix

Run Skype for Business as a Secure Virtual App with a Great User Experience
sponsored by Citrix
WHITE PAPER: Discover how to deliver secure, high-performance UC&C for your organization by virtualizing Skype for Business with the method illustrated. Read on to learn how this app virtualization will improve security and manageability of Skype, as well as how to evade the potential pitfalls traditional virtualization methods incur.
Posted: 25 Jan 2017 | Published: 31 Dec 2016

Citrix

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Learn not only how developers are responding to application security trends, but also what vulnerabilities are of top concern, the risk of open-source components, insight into security during the app lifecycle, and more.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

State of Software Security: A Developer's Viewpoint
sponsored by Veracode, Inc.
WHITE PAPER: Discover app development vulnerability benchmarks and prevalence by type, as well as insights for developers to ensure the security of the apps that they are creating. Uncover solid insights into app security, such as security features being applied incorrectly, component vulnerability dangers, and more.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

How to Build a Robust Application Security Governance Framework
sponsored by Veracode, Inc.
WHITE PAPER: Discover not only how to simplify, but also streamline application security. Learn how to ensure that everyone is in-sync and that the organization is maximizing its investments, interpreting test results effectively, and setting expectations for everyone.
Posted: 17 Jan 2017 | Published: 17 Jan 2017

Veracode, Inc.

Ansible Tower Demo: The Case for IT Orchestration
sponsored by Red Hat
VIDEO: Do you have a framework for automating IT systems? Learn how to integrate Ansible Tower orchestration and IT configuration with your own Linux server or cloud instance. Download now to see if agentless IT automation is right for your organization's app infrastructure.
Posted: 16 Jan 2017 | Premiered: 16 Jan 2017

Red Hat

The Benefits of Bug Bounty Programs and Security Code Testing
sponsored by Veracode, Inc.
RESEARCH CONTENT: In this survey from Wakefield research, find out how a variety of IT professionals are adapting to new vulnerabilities as well as additional steps you can take to keep your app safe from both external and internal threats.
Posted: 13 Jan 2017 | Published: 13 Jan 2017

Veracode, Inc.

App Security Can’t Happen Without Developers
sponsored by Veracode, Inc.
WHITE PAPER: In this report from Forrester, learn how to guide developers and security pros to deliver secure apps. Gain key takeaways that will help your developer team and security team work together to mitigate app security threats before they appear.
Posted: 13 Jan 2017 | Published: 13 Jan 2017

Veracode, Inc.

Automating Cloud Infrastructure with Ansible IT Engine
sponsored by Red Hat
CASE STUDY: Examine how Splunk accelerated IT provisioning, configuration, and task management within its cloud infrastructure with an automation engine that rapidly deploys and scale server clusters and apps, configures the cloud on-demand, and autoscales infrastructure as needed.
Posted: 12 Jan 2017 | Published: 12 Jan 2017

Red Hat

What's in Your Mobile App Dev Toolbox?
sponsored by OutSystems
EGUIDE: Mobile application success comes down to having the right strategy in place and the right tools at your disposal. This essential guide explores the 8 factors that dictate enterprise mobile app success and takes you inside 3 enterprise mobile app stories, why these apps saw success, and how to replicate it for yourself.
Posted: 09 Jan 2017 | Published: 04 Jan 2017

OutSystems

What's Trending in Retail and Mobile Technology
sponsored by SOTI Inc.
EBOOK: 84% of shoppers surveyed want to see more location-based technology. Access this e-book to learn how in-store mobile technology is shaping the future of retail. Discover the role the Internet of Things will play in future retail and what this means for e-commerce.
Posted: 05 Jan 2017 | Published: 30 Dec 2016

SOTI Inc.

Why RAD is Right for Mobile and Web Front-End Development
sponsored by OutSystems
WHITE PAPER: Discover how to deliver agile, responsive front-end applications with rapid app development (RAD). Read on to meet today's dramatically digital customer journey by upgrading your legacy stacks and mobile app strategy, learning how to overcome the challenges in adopting an open-source stack, and more.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

OutSystems

Trustwave Global Security Report
sponsored by SingTel
WHITE PAPER: Discover in-depth analysis and organized statistics from breach investigations, incident reports and vulnerability research from around the world. Use this report as a business plan to learn what cybercriminals are plotting now and what you could face in the future.
Posted: 04 Jan 2017 | Published: 31 Dec 2016

SingTel

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Manage Risk by Protecting the Apps and Data that Drive Business Productivity
sponsored by Citrix
WHITE PAPER: Traditional perimeter-based security has been rendered ineffective by mobility and the cloud. In this infographic, learn how to successfully navigate the increasingly volatile IT business environment and take a new approach to information security.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Protecting the 3 Areas of Secure Mobility
sponsored by BlackBerry
WHITE PAPER: Protect the three areas of secure mobility, whether your users are accessing data locally, on your corporate network, or through a cloud service. Discover how to drive transformative mobility without adding risk to your network and data.
Posted: 20 Dec 2016 | Published: 30 Nov 2016

BlackBerry

Magic Quadrant for Application Security Testing
sponsored by IBM
WHITE PAPER: In this analyst report, learn about how 19 application security testing (AST) vendors fared in a comparison of their strengths and cautions. Discover which one is right for your organization.
Posted: 15 Feb 2017 | Published: 15 Feb 2017

IBM

Application Security Testing Vendor Evaluations
sponsored by Veracode, Inc.
ANALYST REPORT: This Gartner report evaluates vendors' maturity in offering application security testing features. Learn the strengths and weaknesses of each vendor to better assess which product is right for you.
Posted: 12 Jan 2017 | Published: 06 Aug 2015

Veracode, Inc.
26 - 50 of 781 Matches Previous Page    1 2 3 4 5    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement