IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
26 - 50 of 876 Matches Previous Page  |  Next Page
The Agile Security Manifesto
sponsored by Synopsys
WHITE PAPER: Find out how to achieve continuous integration/continuous deployment (CI/CD) safely and securely with the 4 principles of building app security into Agile development.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

Synopsys

Understanding the Benefits of API Management
sponsored by Akamai Technologies
RESEARCH CONTENT: Due to APIs having a variety of use cases, API management software is becoming a requirement. In this IDC Q&A, find out how to overcome the challenges of API management, solve security concerns and best practices for managing high-value APIs.
Posted: 02 Nov 2017 | Published: 30 Sep 2017

Akamai Technologies

Accelerating and Protecting APIs
sponsored by Akamai Technologies
WHITE PAPER: With APIs powering critical websites and apps, read this white paper to learn how you can optimize performance and address API vulnerabilities.
Posted: 02 Nov 2017 | Published: 02 Nov 2017

Akamai Technologies

How do Organizations Plan to Assure Application Delivery in a Multi-Cloud World?
sponsored by Citrix
RESEARCH CONTENT: In this IDC InfoBrief based on survey results from more than 900 global organizations, learn how your peers have overcome the obstacles to application delivery in hybrid and multi-cloud environments.
Posted: 01 Nov 2017 | Published: 31 Oct 2017

Citrix

Your Checklist for a Cloud-Native Development Platform
sponsored by Red Hat
WHITE PAPER: Find out how to evaluate cloud-native app development platforms and access a checklist that will help you choose the one that's best suited for your business.
Posted: 31 Oct 2017 | Published: 31 Oct 2017

Red Hat

Vendor Landscape: Vulnerability Management, 2017
sponsored by Tenable, Inc.
WHITE PAPER: According to a Forrester security survey, software vulnerabilities are the leading method of external intrusion in a breach. Explore this Forrester report to learn more about the vulnerability management vendor landscape and security trends that directly affect and enable business operations.
Posted: 30 Oct 2017 | Published: 30 Oct 2017

Tenable, Inc.

5 Risk Points to Avoid in Enterprise Security
sponsored by Microsoft
WHITE PAPER: According to the Verizon Data Breach Investigations Report, nearly 80% of organizations reported data breaches, with 1/3 of them reporting more than 6 breaches. In this white paper, find out how you can boost your organization's device and app security, all while protecting against malware, data breaches and more.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Microsoft

Why IPS Devices and Firewalls Fail to Stop DDoS Threats
sponsored by Arbor Networks
WHITE PAPER: According to data center respondents of Arbor's Worldwide Infrastructure Security report, 67% have experienced a multi-vector DDoS attack. In addition, 45% of respondents experienced firewall or IPS device failure during an attack. This white paper reveals why IPS devices and firewalls can't stop DDoS attacks.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Arbor Networks

The State of Endpoint Protection & Management
sponsored by Absolute
WHITE PAPER: According to Larry Ponemon of the Ponemon Institute, 67% of enterprises are unable to detect employee use of insecure mobile devices. This white paper aims to answer some of the top questions security and IT operations executives face in regard to endpoint security, mobile security, and overall protection of your enterprise.
Posted: 20 Oct 2017 | Published: 20 Oct 2017

Absolute

The Three Faces Of Insider Threat
sponsored by Absolute
WHITE PAPER: According to IBM, 95% of all security incidents involve human error. Are you prepared for the enemy within? In this white paper, uncover how to protect your organization against insider threats.
Posted: 20 Oct 2017 | Published: 20 Oct 2017

Absolute

The Stakes Have Changed, Have You? 20 Years of DDoS Attacks Targeting Business
sponsored by Arbor Networks
WHITE PAPER: According to the Worldwide Infrastructure Security Report, 93% of survey respondents experienced application layer-attacks and 56% experienced multi-vector DDoS attacks. Inside, learn how DDoS attacks have evolved and changed over time.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

Arbor Networks

Cisco and Splunk: Innovation through the Power of Integration
sponsored by Splunk
WEBCAST: In this webcast, gain a better understanding of the partnership between Cisco and Splunk. Then find out how IT network pros are able to leverage better cloud security and quickly troubleshoot issues and outages.
Posted: 18 Oct 2017 | Premiered: Sep 28, 2017

Splunk

What You SIEM is What You Get
sponsored by AlienVault
WHITE PAPER: A properly executed SIEM strategy is difficult to achieve. Explore this white paper to gain a deeper understanding of how your company can overcome SIEM challenges and implement a successful platform.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault

Increasing Application Availability
sponsored by Silver Peak
WHITE PAPER: In this white paper, learn how to overcome the challenges of poor application availability and performance with the help of an SD-WAN architecture.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Silver Peak

ExpensiveWall: A Dangerous 'Packed' Malware on Google Play that will Hit You in Your Wallet!
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Go inside this resource to learn what makes the new malware found on Google Play, nicknamed "ExpensiveWall" so unique and dangerous, as well as what steps you can take to stay protected.
Posted: 17 Oct 2017 | Published: 14 Sep 2017

Check Point Software Technologies Ltd.

Amazon Web Services: Overview of Security Processes
sponsored by Amazon Web Services
WHITE PAPER: You may be wondering, "how does AWS help ensure that my data is secure?" This document delivers the answer to this question and is intended to provide an overview of the security processes involved with Amazon Web Services.
Posted: 16 Oct 2017 | Published: 31 May 2017

Amazon Web Services

Virtualize Skype for Business for Secure Unified Communications
sponsored by Citrix
RESOURCE: With thousands of distributed devices, a traditional Skype for Business deployment exposes you to risk. When virtualized instead, however, sensitive chat logs and file exchanges are securely stored in the datacenter, dramatically reducing risk. Download this resource to discover additional benefits of virtualizing Skype for Business.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Citrix

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Symantec
WHITE PAPER: Cloud apps introduce a new threat vector, with lots of credentials floating around that provide direct access to business critical data. This white paper provides planning strategies for adopting cloud apps as well as information on managing the human factor.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Symantec

European Businesses: You have a BYOD programme whether you like it or not
sponsored by Lookout
WHITE PAPER: 18% of federal employees with smartphones report encountering malicious software or malware. This white paper reveals how to secure your mobile devices from malware and protect your business as a whole from data loss.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Lookout

AWS Best Practices for DDoS Resiliency
sponsored by Amazon Web Services
WHITE PAPER: Do not let your website or application become unavailable to end users - protect against DDoS attacks once and for all. Explore this white paper and learn how to improve resiliency of your applications against DDoS attacks with these best practices.
Posted: 10 Oct 2017 | Published: 30 Jun 2016

Amazon Web Services

Overview of AWS Security - Application Services
sponsored by Amazon Web Services
WHITE PAPER: Amazon Web Services offers a variety of managed services to use with your applications, including services that provide application streaming, queueing, push notification, email delivery, search, and transcoding. Learn more inside.
Posted: 10 Oct 2017 | Published: 30 Jun 2016

Amazon Web Services

Overview of AWS Security - Network Security
sponsored by Amazon Web Services
WHITE PAPER: Explore this white paper to learn more about AWS cloud monitoring tools designed to protect your network architecture from threats like DDoS attacks, IP spoofing, and more.
Posted: 10 Oct 2017 | Published: 31 Aug 2016

Amazon Web Services

AWS Security Best Practices
sponsored by Amazon Web Services
WHITE PAPER: Is your data protected from accidental or deliberate theft, leakage, integrity compromise, and deletion? In this white paper, explore best practices that you can leverage to build and define an Information Security Management System (ISMS) and learn how to protect your mission-critical information.
Posted: 09 Oct 2017 | Published: 31 Aug 2016

Amazon Web Services

Overview of AWS Security - Analytics Services, Mobile and Applications Services
sponsored by Amazon Web Services
WHITE PAPER: Cloud-based analytics services can help your organization process and analyze any volume of data. Download this resource to learn how your organization can benefit from a variety of cloud based analytics and mobile application services, ranging from identity and access management to mobile analytics, and deployment and management services.
Posted: 09 Oct 2017 | Published: 01 Jun 2016

Amazon Web Services

Don't Let your Cloud-First Strategy Get Stuck in Traffic
sponsored by Verizon
WHITE PAPER: In this white paper, learn how to overcome SaaS challenges to help build a cloud-first network that fits your business needs.
Posted: 30 Oct 2017 | Published: 30 Oct 2017

Verizon
26 - 50 of 876 Matches Previous Page    1 2 3 4 5    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement