IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security White Papers (View All Report Types)
1 - 25 of 251 Matches Previous Page  |  Next Page
3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

Security Observability: Why Tracing?
sponsored by Traceable
WHITE PAPER: Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable

Solution Brief: The Value of Multi-Vector Protection on the Endpoint
sponsored by Malwarebytes
WHITE PAPER: Today cybercriminals have moved to a multi-vector attack approach. It combines a mixture of social, malware, and hacking, which represent the triple threat in their multi-vector attack technique. And it's working. This means your endpoint security must protect from all 3. Read on to learn about a single solution for these multi-vector attacks.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Malwarebytes

Secrets to a Stronger Strategy for Container Security
sponsored by Alert Logic
WHITE PAPER: 58% of developers report that their companies use or plan to use containers in the next 12 months. Despite their smaller footprint and attack surface, containerized environments are still vulnerable. But setting up container security isn’t as mysterious as you may think. Leverage this AWS white paper to learn 8 secrets to securing containers.
Posted: 16 Feb 2021 | Published: 16 Feb 2021

Alert Logic

Fit Security into Your Software Life Cycle
sponsored by Micro Focus
WHITE PAPER: In fast-paced business cycles, securing software applications requires collaboration. So what are the necessary steps to take in ensuring that your organization’s app development process is mindful of security? Read this white paper to learn how this is done using the right testing tools as well as the power of automation.
Posted: 08 Feb 2021 | Published: 08 Feb 2021

Micro Focus

Equifax—Transforming The Organization With Fortify On Demand
sponsored by Micro Focus
WHITE PAPER: In this white paper, discover how Equifax adopted a shift-left culture and secure DevOps practices by integrating Fortify on Demand when transforming development to the cloud.
Posted: 05 Feb 2021 | Published: 05 Feb 2021

Micro Focus

The Technology behind Radware Bot Manager for APIs
sponsored by Radware
WHITE PAPER: APIs are seeing massive adoption, and organizations are discovering ways to secure them from potential intrusion and exploitation. One of the most prominent API threats is ‘bad bots,’ and they’ve seen a 30% increase in the past year. To learn how you can protect from automated attacks targeting APIs, get stuck into this white paper by Radware.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Radware

Why Security is Now a Critical Component of Application Delivery
sponsored by Radware
WHITE PAPER: Because today’s threats can be so costly, combining application protection with application delivery has become mission-critical. Radware Alteon is an application delivery solution that integrates web application firewall (WAF), bot management and automation to ensure apps stay secure. Jump into this solution brief for a product overview.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Radware

Why Lack of Application Security Skills and Experts Can Cripple Digital Transformation Initiatives
sponsored by Contrast Security
WHITE PAPER: Over the past year, 73% of organization had at least one intrusion or breach due to a gap in cybersecurity skills – 47% had three or more such events. Download this white paper to take a deep dive into this issue, all by the numbers, as well as some ways to overcome outdated modes of application security to push digital transformation initiatives.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Contrast Security

Advanced Threat Landscape and Legacy Applications Security Ratchet Up Risk
sponsored by Contrast Security
WHITE PAPER: Agile and DevOps methodologies have brought incredible innovation to the software development lifecycle. However, innovation comes with certain risks. Legacy security tools aren’t keeping pace with modern software development and the increasingly advanced threat landscape within. Learn to move forward securely in this application security guide.
Posted: 22 Jan 2021 | Published: 22 Jan 2021

Contrast Security

Financial Grade APIs Using OAuth and OpenID Connect
sponsored by Curity AB
WHITE PAPER: OAuth and OpenID Connect are international standards that define methods for securing APIs. They carry much weight when it comes to financial compliance. In this white paper, explore various aspects of OAuth and OpenID Connect that can be used to conform to the revised Directive on Payment Services (PSD2) and the GDPR.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Curity AB

The Neo-Security Architecture
sponsored by Curity AB
WHITE PAPER: The Neo-Security Architecture is a blueprint for addressing the growing needs across both identity and security – serving as a road map for new projects as well as a guide to understand existing functions. Read this white paper for a deep dive into at this new architecture, including who should adopt it and why.
Posted: 15 Jan 2021 | Published: 15 Jan 2021

Curity AB

Overcoming the Legacy VPN Dilemma: Zero-Trust Access with Application Access Cloud
sponsored by Axis Security
WHITE PAPER: Employees are now everywhere, and while staff and integrated third-party remote work models are commonplace, the access models enabling them are outdated and broken. It’s now worth considering an application-level access solution that uses a zero-trust model. Access this white paper to discover such a solution.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

Enabling a SASE Approach to Private Application Access and Security
sponsored by Axis Security
WHITE PAPER: Enterprises still lag in delivering and securing private applications to business users due to legacy security and access methods. Some businesses bring their legacy apps to the cloud, but these ‘cloudified’ apps still tend to underperform. Stop living in the past – check out this white paper on the Application Access Cloud by Axis Security.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

5 Powerful Solutions for Scaling Application Security
sponsored by ZeroNorth
WHITE PAPER: Inside this State of Application Security report, find the most up-to-date findings, discover the 5 most powerful solutions for scaling application security, and explore how the infamously rocky relationship between development and security managed throughout 2020. Download the report here.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

ZeroNorth

On the Radar: Axis Security Takes a Different Approach to Zero-Trust Access
sponsored by Axis Security
WHITE PAPER: Businesses need to ensure that their networks are protected, even when remote employees are accessing applications on a constant basis. But VPNs struggle to meet this need without latency or downtime, so what is the next best option? Download this white paper from Axis Security to discover their cloud-delivered, zero-trust inspired model.
Posted: 08 Jan 2021 | Published: 06 May 2020

Axis Security

Revealing the Cultural Divide Between Application Security and Development
sponsored by ZeroNorth
WHITE PAPER: The cultural divide between security teams and developers is as old as application development itself. This research report sets out to define the top concerns and demands of each side of this infamous debate, so businesses can understand what steps they should take to help their teams and their application security alike. Download the report here.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

ZeroNorth

Enabling Partners With Simple, Private Application Access
sponsored by Axis Security
WHITE PAPER: Securing and managing third-party access to critical applications is a growing concern for IT teams. This whitepaper offers a closer look at the Axis Security Application Access Cloud, designed to simplify, accelerate and secure third-party application enablement & management – read on to get started.
Posted: 08 Jan 2021 | Published: 08 Jan 2021

Axis Security

Security Champions: Empowering Heroes to Unite Security and DevOps
sponsored by ZeroNorth
WHITE PAPER: ZeroNorth’s Security Champions program is gaining steam as the early adopters’ AppSec successes are becoming more and more clear. In this report, find the ins and outs of the Security Champions program, and see if the program is the right fit for your teams
Posted: 07 Jan 2021 | Published: 07 Jan 2021

ZeroNorth

Federated Responsibility for AppSec: A New Model to Power Secure DevOps
sponsored by ZeroNorth
WHITE PAPER: The role of the Chief Information Security Officer (CISO) has long been plagued by the notorious divide between DevOps and Security teams. Luckily, there’s a new solution that can liberate CISOs from this conflict. In this paper, explore the top 4 ways the Federated Responsibility Model can help evolve CISO’s role.
Posted: 07 Jan 2021 | Published: 07 Jan 2021

ZeroNorth

The ROI of the ZeroNorth® AppSec Automation & Orchestration Platform
sponsored by ZeroNorth
WHITE PAPER: Today, DevOps presents an opportunity to flip the script on AppSec investments. Organizations can finally see past the myth of AppSec as a never-ending cost center by automating and orchestrating AppSec tools with development pipelines. See how AppSec automation and orchestration can fit into your DevOps strategy here.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

ZeroNorth

2020 Election Security
sponsored by WhiteHat Security
WHITE PAPER: Around the globe, we’ve witnessed how cybercriminals can create chaos during election cycles by disqualifying legitimate voters, corrupting voter data and launching denial-of-service attacks. In recent years, U.S. elections have come under continuous assault. See this white paper to learn about the security challenges this causes for the country.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

WhiteHat Security

Secure SD-WAN: A Comprehensive Guide
sponsored by Fortinet, Inc.
WHITE PAPER: With the rapid rise in SaaS and IaaS use, many network engineering and operations leaders are looking to replace their outdated WAN infrastructures with SD-WAN. While selecting the right SD-WAN for a particular use case may require a few compromises, security shouldn’t be one of them. Access this guide to learn about secure SD-WAN.
Posted: 29 Oct 2020 | Published: 03 Oct 2019

Fortinet, Inc.

Product Brief: Endpoint Agent
sponsored by Sinefa
WHITE PAPER: Security managers and professionals need endpoint monitoring that allows them to gain actionable insights into end user experience and troubleshoot problems. Most of all, these professionals need visibility over their networks so that they can work to optimize performance. Read this white paper to learn about Sinefa’s Endpoint Agent.
Posted: 24 Sep 2020 | Published: 24 Sep 2020

Sinefa

2020 Application Security Observability Report
sponsored by Contrast Security
WHITE PAPER: Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.
Posted: 21 Sep 2020 | Published: 13 Jul 2020

Contrast Security
1 - 25 of 251 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info