IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
26 - 50 of 731 Matches Previous Page  |  Next Page
Building Real-time Mobile Solutions with MQTT
sponsored by IBM
WHITE PAPER: In this comprehensive white paper, you will be introduced to messaging appliance designed to handle the scale and security of a robust IoT solution, as well as, use cases in a variety of domains, with sample messaging topology and suggestions for design.
Posted: 15 Sep 2015 | Published: 15 Sep 2015


Secure-by-Design Protection for Application and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to protect them.
Posted: 14 Sep 2015 | Published: 22 May 2014


Simpler, Smarter Authentication
sponsored by Okta
WHITE PAPER: This white paper examines how to protect user credentials from a range of advanced attacks.
Posted: 11 Sep 2015 | Published: 05 Aug 2015


The Total Economic Impact of Migrating From An Open Source Environment
sponsored by IBM
WHITE PAPER: This Forrester Research report examines the total economic impact achieved by migrating from an open source environment to the WebSphere Application Server. Access this study to learn how you can improve capabilities and operational efficiency.
Posted: 11 Sep 2015 | Published: 30 Jun 2012


Shadow Data Exposed: 7 High Profile Risks
sponsored by Elastica
WEBCAST: In this webcast, you'll uncover the 7 high level risks of Shadow Data exisiting in your enterprise and how to gain control over Shadow IT. View now to learn how to gain more visibility into SaaS applications to prevent data loss or breaches.
Posted: 10 Sep 2015 | Premiered: Sep 2, 2015


What if your App Virtualization Solution Didn't Support Location-Based Security?
sponsored by Dell, Inc.
VIDEO: In this video, Brian Madden faces what happens if application virtualization solutions doesn't support location-based security.
Posted: 09 Sep 2015 | Premiered: 19 Jan 2015

Dell, Inc.

Cloud Security: Revealing Shadow Data
sponsored by Elastica
WEBCAST: This webcast presents how Shadow Data creates countless vulnerabilities in your cloud security strategy.
Posted: 08 Sep 2015 | Premiered: Aug 19, 2015


Protecting Your Data in Office 365
sponsored by Elastica
WEBCAST: This webcast examines Shadow Data and the security vulnerabilities it opens for IT
Posted: 08 Sep 2015 | Premiered: Aug 12, 2015


An Unlikely Partnership? Application Security and Development
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the tension between development and security teams and proposes an approach to building security into the software development lifecycle.
Posted: 04 Sep 2015 | Published: 19 Aug 2015

Hewlett-Packard Company

Protecting against Application Logic and Session Theft Attacks
sponsored by Barracuda Networks
WHITE PAPER: This white paper discusses the danger of application logic attacks and gives a five-step process for proactively staying secure against them.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

Barracuda Networks

API Management Designed for the Cloud: Getting Started
sponsored by IBM
WHITE PAPER: This white paper highlights a multi-tenant cloud-based service for API development. Access this white paper to learn how to rapidly design, secure, manage, and analyze APIs to reach both internal and external developers.
Posted: 03 Sep 2015 | Published: 03 Sep 2015


Web Application Firewall vs. Intrusion Prevention Systems (IPS)
sponsored by Barracuda Networks
WHITE PAPER: This white paper compares IPS and web application firewalls, detailing the pitfalls of relying on IPS to defend app data today.
Posted: 03 Sep 2015 | Published: 19 Aug 2015

Barracuda Networks

Shadow Data: Why Traditional Security Leaves Your Organization Vulnerable
sponsored by Elastica
WHITE PAPER: This exclusive white paper reviews Shadow Data trends to provide insights into data security and compliance issues.
Posted: 01 Sep 2015 | Published: 29 Jul 2015


Keeping Your Mobile Security Strategy on Pace
sponsored by Lookout
EGUIDE: This expert e-guide outlines the advancement of mobile security threats and how IT is failing to address them.
Posted: 31 Aug 2015 | Published: 21 Aug 2015


Think Like A Cybercriminal: Presenting the Mobile Security Landscape
sponsored by ControlEmail
WHITE PAPER: This white paper examines the mobile email threat landscape and how hackers are taking advantage of the flaws in mobile security strategies. Continue reading to get inside the mind of a hacker to learn how you can fortify your mobile security approach.
Posted: 28 Aug 2015 | Published: 31 Dec 2014


Unified Network Solutions Case Study: Kettering Health Network
sponsored by F5 Networks
WHITE PAPER: This white paper demonstrates how the KHN was able to achieve access to its electronic medical records system and other apps for its remote users. Read on here to key into the benefits of a unified network solution.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

F5 Networks

Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: Download this white paper to learn about the prevalence of jailbroken iOS devices and how to protect against jailbroken device risks.
Posted: 25 Aug 2015 | Published: 24 Jun 2015


Managing App Sideloading Threats on iOS
sponsored by Lookout
WHITE PAPER: Download this white paper to learn about how attackers sideload iOS apps and how to mitigate those threats.
Posted: 25 Aug 2015 | Published: 19 Aug 2015


Top 5 Cloud Data Protection Challenges. Solved.
sponsored by Commvault
WHITE PAPER: This white paper serves as guide with which you can realize the full potential of your next cloud project. Read on to see how the following 5 challenges may impact your cloud integration strategy.
Posted: 24 Aug 2015 | Published: 24 Aug 2015


Simplify and Mobilize Any Business Workflow Securely by Next Week
sponsored by Citrix and Capriza
WEBCAST: In this webinar, you'll learn what it takes to rapidly design and securely deploy apps for your critical business workflows. View now to gain the opportunity to watch as a customized app is designed and deployed in 10 minutes, without the need for complex APIs or writing code.
Posted: 20 Aug 2015 | Premiered: Sep 22, 2015

Citrix and Capriza

Application Session Filtering
sponsored by Gigamon
PRODUCT LITERATURE: This feature brief discusses a way to filter your applications in order to optimize application inspection and identification.
Posted: 20 Aug 2015 | Published: 20 Aug 2015


What to Look For in a Web Application Scanner
sponsored by
EBOOK: With so many Web applications on enterprise networks today, a scanner is essential to security. Here's what you need to know if you're in the market for a Web app scanner.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Authentication That Keeps Your Mobile Devices Secure
sponsored by HID
WHITE PAPER: This white paper introduces a way for you to boost mobile security by enhancing your authentication practices.
Posted: 18 Aug 2015 | Published: 20 Feb 2013


Protect Your Business Critical Apps from Compromise
sponsored by Onapsis
WHITE PAPER: This white paper describes how, with technologies ranging from vulnerability management to advanced threat protection, you can make sure your SAP applications stay secure.
Posted: 18 Aug 2015 | Published: 31 May 2015


The State of Enterprise Mobile Threats
sponsored by Lookout
WHITE PAPER: This report examines the current state of security threats to iOS and Android devices in the workplace.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

26 - 50 of 731 Matches Previous Page    1 2 3 4 5    Next Page
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement