IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by, powered by an online computer dictionary
Application Security Multimedia (View All Report Types)
1 - 25 of 111 Matches Previous Page  |  Next Page
DevSecOps: Mastering security's group effort
sponsored by RSA Conference
WEBCAST: DevSecOps can be costly and time consuming, making it a challenging undertaking. Tune into this webcast to hear security experts discuss the hurdles of DevSecOps and how to foster a successful approach.
Posted: 19 Mar 2018 | Premiered: Mar 19, 2018

RSA Conference

Open Source Security and Compliance: Trends to Act on in 2018
sponsored by Flexera Software
WEBCAST: According to a Forrester report, 45% of firms say they suffered a breach as a result of an external attack, with software vulnerabilities and web applications as the top methods of attack. This webcast reveals the shift in open source security and compliance while outlining how to remain secure and compliant in the upcoming year.
Posted: 13 Mar 2018 | Premiered: Mar 13, 2018

Flexera Software

Open Source Security in 2017: Lessons Learned for the New Year
sponsored by Flexera Software
WEBCAST: The usage of open source software has changed dramatically in the past year. Leverage this webcast to learn about the usage and awareness of open source software in 2017 and how to better prepare for software security in 2018.
Posted: 13 Mar 2018 | Premiered: Mar 13, 2018

Flexera Software

What Security People Want: Making DevSecOps Happen with Containers
sponsored by Aqua Security
WEBCAST: Securing containerized apps is necessary for protecting your organization. Explore this webcast to gain insight into securing applications and making DevSecOps happen with containers.
Posted: 09 Mar 2018 | Premiered: Mar 9, 2018

Aqua Security

How to Keep Your Containers Secure
sponsored by Aqua Security
WEBCAST: In a containerized deployment, how do you safely pass secrets - like passwords and tokens - between containers without compromising their safety? Watch this webcast to uncover the risks, and learn best practices for keeping your secrets secure.
Posted: 09 Mar 2018 | Premiered: Sep 28, 2017

Aqua Security

Expanding the Threat Intelligence Horizon
sponsored by Phantom Cyber
VIDEO: How is your organization defending and responding to threats? Explore this webcast with Phantom and McAfee to uncover an automated threat hunting and response cyber defense approach, which includes a cloud assisted security strategy and integrated security strategies.
Posted: 23 Feb 2018 | Premiered: 21 Feb 2018

Phantom Cyber

Forcepoint CASB: Visibility and Control of Cloud Applications
sponsored by Forcepoint
VIDEO: Watch this webcast to learn about 2 flexible CASB deployment options, as well as the 6 mission-critical capabilities they can provide.
Posted: 16 Feb 2018 | Premiered: 12 Feb 2018


IoT: Take Control of the Edge
sponsored by VMware Pulse
VIDEO: With the increase in IoT, companies can run into challenges of remaining secure, while managing business operations. This brief webinar offers an approach to onboarding, managing, monitoring and securing IoT use cases from the edge to the cloud.
Posted: 14 Feb 2018 | Premiered: 05 Feb 2018

VMware Pulse

Veracode Greenlight Demo
sponsored by Veracode, Inc.
VIDEO: To bolster your app security efforts, learn about CA Veracode's app security platform by accessing a personal demo of how their scalable, SaaS-based platform works to scan massive amounts of code.
Posted: 09 Feb 2018 | Premiered: 09 Feb 2018

Veracode, Inc.

How a Biotech Firm Streamlined Data Protection on AWS
sponsored by AWS - Rubrik
WEBCAST: This webcast reveals how to simplify data backup and recovery for cloud environments, mobilize apps and data from data centers to AWS securely and control on-premises and cloud apps.
Posted: 09 Feb 2018 | Premiered: Feb 9, 2018

AWS - Rubrik

Contextual Access to Apps and Data Anywhere Anytime on Any Device
sponsored by Citrix
WEBCAST: This webcast offers a strategic approach to securing access to apps and data on any desktop or device.
Posted: 05 Feb 2018 | Premiered: Feb 5, 2018


Applying Secure Design Patterns to Microservices Development
sponsored by WhiteHat Security
VIDEO: From a developer's perspective, find out what you can do to improve app security for microservices-based development so that you can find and resolve issues even as you continuously release and iterate code.
Posted: 25 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

The State Of Software Security
sponsored by Veracode, Inc.
WEBCAST: Learn about the key components that comprise an effective app security program, and find out how developers are making strides to play a bigger and more impactful role in app security.
Posted: 25 Jan 2018 | Premiered: Jan 25, 2018

Veracode, Inc.

The Devops Effect
sponsored by Veracode, Inc.
WEBCAST: There are several core principles that you must look at when adopting DevSecOps. Watch this short video to learn what you need to do now and in the future to migrate smoothly.
Posted: 24 Jan 2018 | Premiered: Jan 24, 2018

Veracode, Inc.

The Cyber Security at Your Company is at Risk
sponsored by Veracode, Inc.
WEBCAST: Click inside to learn how you can gain end-to-end, cloud-based platform security for both your endpoints and your application layer.
Posted: 24 Jan 2018 | Premiered: Jan 24, 2018

Veracode, Inc.

Why Websites Stay Vulnerable: And What You Can Do About It
sponsored by WhiteHat Security
VIDEO: Web application attacks represent a major threat to an organization's security posture. According to the Verizon DBIR, 30% of breaches involve web attacks. Take a look at this webinar to learn about vulnerabilities within websites and how you can increase your web application security.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

WhiteHat Security

Web Application Authorization and Authentication Explained
sponsored by WhiteHat Security
VIDEO: According to the 2017 Verizon DBIR, 30% of total breaches reported involved attacks on web applications. Explore this webinar to gain insight into application authorization and authentication in order to enhance your application security program.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

WhiteHat Security

2017 Application Security Statistics Report
sponsored by WhiteHat Security
VIDEO: According to the Verizon DBIR, 30% of total breaches reported involved attacks on web applications. This webinar explores effective application security programs by using data from the WhiteHat Application Security Statistics Report.
Posted: 23 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

Getting the Most out of your AppSec Program
sponsored by WhiteHat Security
VIDEO: According to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program.
Posted: 23 Jan 2018 | Premiered: 23 Jan 2018

WhiteHat Security

Cross-Site Scripting Attacks: Identify and Defend against Malicious Code
sponsored by WhiteHat Security
VIDEO: Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code across web and mobile apps faster.
Posted: 22 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

DevSecOps Blueprint
sponsored by WhiteHat Security
WEBCAST: The average time to fix vulnerabilities in the DAST industry is 174 days. Take a look at this webcast to uncover successful DevSecOps implementations and data to guide the deployment of DevSecOps in your organization.
Posted: 22 Jan 2018 | Premiered: Jan 22, 2018

WhiteHat Security

Unified MTD + MARS is the Best Practice for Mobile Security
sponsored by Lookout
WEBCAST: Download this webcast to understand the full mobile risk matrix and discover how mobile threat defense (MTD) combined with mobile app reputation services (MARS) can protect your organization from mobile threats to apps, devices, networks and more.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018


The ROI of AppSec: Getting your Money's Worth from your AppSec Program
sponsored by Veracode, Inc.
WEBCAST: Access this webcast to gain a better understanding of the impact of application security on the end-to-end software development value chain. Then, discover how much it really cost to fix security vulnerabilities in relation to application development.
Posted: 16 Jan 2018 | Premiered: Jan 16, 2018

Veracode, Inc.

Orchestration of App-Driven Security Policies
sponsored by Silver Peak
WEBCAST: Take a look at this webcast to discover how to orchestrate security policies within applications.
Posted: 11 Dec 2017 | Premiered: Dec 11, 2017

Silver Peak

FBI Cyber Squad Guest Speaking on Emerging Cyber Threats
sponsored by Digital Shadows
WEBCAST: Do you understand your data and susceptibility to being targeted? Watch this webcast to uncover emerging cyber threats, persistent vulnerabilities and strategies for protecting your enterprise.
Posted: 21 Nov 2017 | Premiered: Nov 21, 2017

Digital Shadows
1 - 25 of 111 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement