IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 
Definition continues below.
Application Security Reports
51 - 75 of 790 Matches Previous Page  |  Next Page
DevSecOps: Putting the Security in DevOps
sponsored by Sonatype
EGUIDE: Security in DevOps, aptly named DevSecOps, is something that your development organization is going to have to deal with soon. This e-guide is your primer to bringing these two departments together when they come from such different perspectives. Learn how to improve collaboration, incorporate security earlier in development, and more.
Posted: 08 May 2017 | Published: 04 May 2017

Sonatype

Secure Agile Development: Why Can't We All Get Along?
sponsored by Veracode, Inc.
WEBCAST: As developers turn to Agile methodologies to accelerate development, app security can often get left in the dust. This webcast explores strategies for increasing collaboration between development and security teams. Learn how to bring security testing up to speed to ensure software quality in Agile development environments.
Posted: 05 May 2017 | Premiered: May 5, 2017

Veracode, Inc.

Coordinating Sec, Dev, and Ops: Improving App Security for Agile Methodologies
sponsored by Veracode, Inc.
WEBCAST: This webcast explores how to update app security and improve software quality by integrating security into the app development process from beginning to end. Find out how to unite security teams with both Dev and Ops by leveraging strategies for building trust between the different teams and fostering collaboration.
Posted: 05 May 2017 | Premiered: May 5, 2017

Veracode, Inc.

Mobile, Cloud & Desktop Security: 3 Keys to Digital Success
sponsored by MobileIron
WHITE PAPER: What's holding so many organizations back from using mobile to its full potential? Mobile, cloud, and desktop security. Access this white paper to learn how to protect your critical data on any device, network, or cloud service so you can focus on delivering business value instead of reacting to security threats and fighting fires.
Posted: 05 May 2017 | Published: 30 Dec 2016

MobileIron

Secure Apps at the Speed of DevOps
sponsored by Veracode, Inc.
RESEARCH CONTENT: This Forrester Research report explores the importance of uniting security pros with Dev and Ops to deliver on accelerated secure app development. Uncover the report's key findings to learn how to build security into earlier stages of the app lifecycle to remediate vulnerabilities without sacrificing speed.
Posted: 04 May 2017 | Published: 16 Dec 2016

Veracode, Inc.

An Essential Guide to IoT App Development
sponsored by Mendix
WHITE PAPER: With varying levels of complexity for endpoints, software, security, and integration, the defining elements of IoT can seem overwhelming. To help guide you through IoT adoption, this paper digs down into the anatomy of IoT and explores how to overcome the challenges of IoT app development.
Posted: 04 May 2017 | Published: 04 May 2017

Mendix

Free Download: CISSP Certification Strategic Guide
sponsored by TechTarget
RESOURCE: For security professionals, CISSP certification is globally recognized as a standard of achievement which is why we partnered with (ISC)2 to create CISSP Certification: A step-by-step strategic guide. Fill out this short survey to receive immediate access to this resource and one step closer certification.
Posted: 03 May 2017 | Published: 18 Apr 2014

TechTarget

Putting Security Into DevOps
sponsored by Veracode, Inc.
WHITE PAPER: This white paper explores how DevOps helps you weave security testing, validation, and monitoring into each stage of the app lifecycle. Find out how to enable secure DevOps app development, and pave the way for continuous integration and continuous deployment.
Posted: 03 May 2017 | Published: 30 Oct 2015

Veracode, Inc.

The Developer's Guide to the DevSecOps Galaxy
sponsored by Veracode, Inc.
WHITE PAPER: Bringing developers and operations staff together under the singular DevOps roof means trying to mesh contradictory approaches, leaving open security concerns. DevSecOps to the rescue! Access this white paper to learn about DevSecOps challenges, best practices, and more!
Posted: 03 May 2017 | Published: 03 May 2017

Veracode, Inc.

How to Showcase Your Skills and Become a Star Developer
sponsored by Veracode, Inc.
WHITE PAPER: In today's world where coding languages rise and fall at the drop of a hat, it can be difficult to keep up. In this white paper, learn 3 tricks to developing and showcasing your skills not just to succeed now, but to position yourself for success throughout your career.
Posted: 03 May 2017 | Published: 03 May 2017

Veracode, Inc.

Automating Governance with DevOps and Supply Chain Management
sponsored by Sonatype
RESEARCH CONTENT: This Forrester Research report explores how to catch governance up to the speed of rapid app development practices with automated supply chain management. Learn how to deliver on the accelerated DevOps' time-to-market without sacrificing software quality and compliance.
Posted: 02 May 2017 | Published: 10 Nov 2016

Sonatype

How to Automate Security into Your DevOps Pipeline
sponsored by Veracode, Inc.
WHITE PAPER: Manual penetration testing and on-premise tools help prevent breaches, but they're too slow for an increasingly fast-paced, mobile-first world. Discover how to accelerate time-to-market without sacrificing app compliance by integrating security into your existing toolchains and DevOps pipelines.
Posted: 01 May 2017 | Published: 01 May 2017

Veracode, Inc.

The Top 6 WAF Essentials to Achieve Application Security Efficacy
sponsored by Citrix
WHITE PAPER: Due to the nature of web security and how it constantly evolves, it is increasingly difficult to integrate comprehensive security into applications and keep them up-to-date. In this white paper, learn the 6 essential features your web application firewall (WAF) needs to maintain a high degree of security,
Posted: 27 Apr 2017 | Published: 27 Apr 2017

Citrix

Top 5 Benefits of Modernizing and Mobilizing Enterprise Apps
sponsored by PowWow
RESOURCE CENTER: This custom article explores how to modernize key enterprise apps to focus on a more seamless experience for completing tasks and managing workflows. Find out how to boost employee productivity and efficiency, and uncover the top 5 benefits that are motivating the move towards modernization.
Posted: 12 Apr 2017 | Published: 12 Apr 2017

PowWow

Native Hybrid Cloud: A Turnkey Pivotal Cloud Foundry Developer Platform
sponsored by Dell EMC and Intel®
WHITE PAPER: Access now to learn how to boost app developer productivity, empower developers with self-service, and eliminate the cost, time, and complexity of building and maintaining an in-house cloud infrastructure while navigating the cultural shift to DevOps with a native hybrid cloud platform.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Dell EMC and Intel®

Focus ANZ: Security & Digital Transformation
sponsored by ComputerWeekly.com
EGUIDE: With cyber threats and attacks making headlines almost every day, cyber security has now become a key focus of many governments and enterprises all over the world. In this e-guide, read about the new measures the Australian government is putting in placeto protect critical systems from cyber attacks.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

ComputerWeekly.com

Don't Settle, Choose the Best Mobile Security Platform for Your Mobile Transformation
sponsored by MobileIron
WHITE PAPER: This white paper explores how to leverage a modern, scalable EMM platform to bolster your mobile security strategy. Access a comparison guide between AirWatch and MobileIron and learn how to enhance your strategy for securing all things mobile, from apps to emails and beyond.
Posted: 05 Apr 2017 | Published: 31 Dec 2016

MobileIron

What is Enterprise Mobile Security?
sponsored by Lookout
EBOOK: Download this eBook to find out why EMM and MDM are not enough to ensure a secure mobile enterprise and understand where the fault lies in today's EMM/MDM initiatives.
Posted: 31 Mar 2017 | Published: 31 Mar 2017

Lookout

4 Market Trends Driving Mobile Banking
sponsored by HID
WHITE PAPER: Learn about 4 market trends that are changing the way people are banking and accessing their money, and what this means for the future of mobile banking as well as the security concerns that it raises.
Posted: 23 Mar 2017 | Published: 23 Mar 2017

HID

Top 5 Considerations: What to Look For in Mobile Banking Security
sponsored by HID
RESOURCE: Uncover 5 IAM considerations for choosing a mobile banking security tool. Also discover a concise market overview of mobile banking apps, including a look at opportunities for growth and major obstacles.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

HID

End Web Application Security Risks with WAF
sponsored by F5 Networks
EGUIDE: In this expert e-guide, educate yourself on all things WAF by discovering how a WAF works, the best WAF features and more. Additionally, learn how to further resolve web application vulnerabilities.
Posted: 04 May 2017 | Published: 01 May 2017

F5 Networks

How to Manage Oracle E-Business Suite Apps and Databases
sponsored by Data Intensity
ESSENTIAL GUIDE: In this expert e-guide, explore how to simplify and achieve a number of tasks that go into managing Oracle E-Business Suite (EBS) and databases, including patch updates, improving security, and managing cost-based optimizer stats.
Posted: 26 Apr 2017 | Published: 20 Apr 2017

Data Intensity

Building an Application Security Program: Why Education is Key
sponsored by tCell
EGUIDE: Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

Application Development Security Requires Forethought
sponsored by tCell
EGUIDE: Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell

How mobile remote desktop apps work
sponsored by LogMeIn Rescue Lens
EGUIDE: Mobile remote desktop apps can be an important tool for enterprises in keeping up with today's on-the-go workforce. The benefits of greater accessibility mean they could be a strategic fit in a variety of enterprise environments. Learn how to select the right mobile remote desktop products for your business, and how they work.
Posted: 13 Mar 2017 | Published: 10 Mar 2017

LogMeIn Rescue Lens
51 - 75 of 790 Matches Previous Page    1 2 3 4 5 6    Next Page
 
APPLICATION SECURITY DEFINITION (continued): …  are publicly distributed or sold.CWE has been assembled in three levels called tiers. The top tier divides known weaknesses into a few large, general classes for discussion among enterprise management people, academics, researchers and vendors. The middle tier consists of several dozen groups of definitions categorized for use by security experts, system administrators and software developers. The lower tier isthe full list, intended for people at all levels including personal computer (PC) users. The entries in CWE are numbered for reference.CWE is compiled and updated by a diverse, international … 
Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement