IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security White Papers (View All Report Types)
26 - 50 of 423 Matches Previous Page  |  Next Page
Maintaining Business Continuity & Security for Your Organization
sponsored by Citrix
WHITE PAPER: Whether planned or unplanned, business disruptions that aren't managed effectively come at a high cost. This white paper offers strategies for keeping your company productive during unplanned security incidents.
Posted: 29 Jan 2018 | Published: 29 Jan 2018

Citrix

SyncDog Metropolitan Police Department Case Study
sponsored by SyncDog
WHITE PAPER: In this case study, find out how a large metro police department faced dramatic improvements of workflow and compliance for handling of crime-scene data.
Posted: 24 Jan 2018 | Published: 28 Sep 2017

SyncDog

Design Secure Software from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: Explore 6 benefits for developers of a fully automated static analysis security testing (SAST) tool that can bring a focus on security into the beginning of the software development lifecycle.
Posted: 22 Jan 2018 | Published: 31 Dec 2017

WhiteHat Security

A WhiteHat Sentinel Product Family Overview
sponsored by WhiteHat Security
WHITE PAPER: In this white paper learn how WhiteHat Sentinel, a SaaS product suite combines application scanning with one of the world's largest threat research team to provide you with 3 different types of analysis to ensure your apps are safe, no matter where they live.
Posted: 19 Jan 2018 | Published: 30 Dec 2016

WhiteHat Security

Discover Static Applications Security Testing for Microservices
sponsored by WhiteHat Security
WHITE PAPER: In the race to get to market, the last thing you want is to overlook the security of your microservices architecture. Don't leave your development process vulnerable. Click inside to learn about a Static Applications Security Testing (SAST) offering that allows you to ensure your microservices are as safe as possible.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

WhiteHat Security

A Strategic Approach to Web Application Security
sponsored by WhiteHat Security
WHITE PAPER: App vulnerabilities originate with the source code, and you'll want to secure more of your source code in both development and production. But it's easier said than done for security pros to review source code continuously. Uncover a new static application security testing subscription service to address this problem.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

WhiteHat Security

Getting the Board on Board with Application Security
sponsored by WhiteHat Security
WHITE PAPER: CISOs need to make sure their business considers AppSec from the highest levels. Review these 4 recommendations to improve your business' AppSec and get the support you need.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

WhiteHat Security

Whitehat's Recent Offerings Put Security Expertise at the Developer's Fingertips
sponsored by WhiteHat Security
WHITE PAPER: Read through 451 Research's assessment of WhiteHat Scout and how the product broadens WhiteHat Security's capabilities.
Posted: 17 Jan 2018 | Published: 06 Dec 2017

WhiteHat Security

The Art of Application Security: Getting Started with DevSecOps
sponsored by WhiteHat Security
WHITE PAPER: According to the Verizon DBIR, 60% of breaches involved web app attacks. Take a look at this white paper to discover best practices for application security as well as a case study example to prove the benefits of the application security best practices.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

WhiteHat Security

Mobile Threat Report
sponsored by Lookout
WHITE PAPER: With mobile threats becoming increasingly sophisticated it's more important than ever for organizations to know what threats they face, and how those threats can cause data loss, compliance infringement, and brand reputation damage. Download this white paper to uncover the latest mobile threats to your organization.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Lookout

Move Mission-Critical Workloads Into the Cloud
sponsored by AdvizeX Technologies
WHITE PAPER: With more enterprises looking to invest the majority of IT budgets in the cloud, you need a cloud platform built to address the unique needs of mission-critical applications including security, compliance, and guaranteed performance and service levels. Read on to learn more.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

AdvizeX Technologies

The Developer's Guide to Software Integrity
sponsored by Synopsys
WHITE PAPER: Explore the importance of DevSecOps in building high-quality apps and learn which tools are best suited to helping developers identify and resolve the bugs that can lead to crashes or act as points of entry for attackers.
Posted: 11 Jan 2018 | Published: 31 Dec 2017

Synopsys

The Architecture of a Container Intelligence Platform
sponsored by Sysdig
WHITE PAPER: Containers are changing the way we run software, and you need a unified approach for monitoring, security, and forensics in containerized & microservice environments. Read this white paper to learn how an intelligent container platform helps you achieve this, emboldening your container strategy.
Posted: 11 Jan 2018 | Published: 29 Nov 2017

Sysdig

Microservices vs. Service-Oriented Architecture
sponsored by NGINX
WHITE PAPER: Both microservices architecture and SOA are considered service-based architectures with shared characteristics, but very different architecture styles. This 50+ page e-book compares the two architectures to enable you to make the best choice to meet your organization's unique needs.
Posted: 11 Jan 2018 | Published: 11 Jan 2018

NGINX

Take Your App Development Strategy to the Cloud
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Learn about the Oracle Cloud and find out how you can modernize app development in hybrid cloud environments without sacrificing IT security or control over critical data or business processes.
Posted: 09 Jan 2018 | Published: 31 Dec 2017

Oracle Corporation UK Ltd

Deploying Your API Infrastructure: Cloud, On-Premises or Both?
sponsored by CA Technologies
WHITE PAPER: Find out how to approach API management from a usage model perspective, and learn about an end-to-end API management platform that offers secure cloud, on-premise, and hybrid deployment options.
Posted: 08 Dec 2017 | Published: 31 Dec 2016

CA Technologies

Choosing the Right API Management Platform
sponsored by CA Technologies
WHITE PAPER: Explore the main challenges and risks of enabling secure API management. To make sure that your information stays safe while still accelerating development, find out how to enable end-to-end API lifecycle management, security, and governance.
Posted: 07 Dec 2017 | Published: 31 Dec 2016

CA Technologies

Mobile API Gateway: Improve Mobile App Development, Security, and UX
sponsored by CA Technologies
WHITE PAPER: Explore how to simplify the process of adapting internal data, apps, and security infrastructure for mobile and IoT, and learn about the CA Mobile API Gateway.
Posted: 05 Dec 2017 | Published: 05 Dec 2017

CA Technologies

App-ID Tech Brief: Traffic classification that identifies applications traversing your network
sponsored by Palo Alto Networks
WHITE PAPER: In this technology brief, learn about App-ID, a patented traffic classification technology that identifies applications traversing your network. Find out how App-ID enables creation and enforcement of safe application enablement policies and brings increased application visibility and control back to the firewall.
Posted: 29 Nov 2017 | Published: 29 Nov 2017

Palo Alto Networks

Virtualization And The Digital Workspace
sponsored by VMware
WHITE PAPER: Download this white paper to discover five considerations to take into account to integrate virtualization into your digital workspace strategy and tackle the challenge of today's mobile, dynamic workforce.
Posted: 29 Nov 2017 | Published: 29 Nov 2017

VMware

Enterprise Mobility Roadmap
sponsored by VMware
WHITE PAPER: Download this roadmap for 5 essential steps to future-proofing your mobility strategy. You'll learn how unified and cloud-based platforms, analytics and security infrastructures can drive visibility in device usage and policies to protect your organization – while allowing employees the flexibility they demand.
Posted: 29 Nov 2017 | Published: 29 Nov 2017

VMware

4 Essential Strategies for Endpoint Security and Protection
sponsored by Absolute
WHITE PAPER: Endpoint devices are the single largest group of devices inside your network today. Disruption of endpoints can have a serious impact on your day to day business operations. This resource offers 4 essential strategies to improve your endpoint security and protection.
Posted: 30 Jan 2018 | Published: 30 Jan 2018

Absolute

Privilege Manager Tool
sponsored by Thycotic
WHITE PAPER: Targeted attacks are always after accounts with highly elevated privileges on sensitive and critical systems: privileged accounts. Explore this resource to gain insight into least privilege management and endpoint security strategies.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Thycotic

Don't Switch To Windows 10 Without An Endpoint Security Plan
sponsored by Thycotic
WHITE PAPER: According to the Thycotic 2017 BlackHat Report, 73% of hackers report that traditional anti-virus tools are irrelevant or obsolete, and don't adapt quickly enough to block emerging threats. This resource offers endpoint and application security strategies as well as tactics to enhance your Windows 7 and 10 security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Thycotic

Top 10 Keys to Successful Least Privilege Adoption
sponsored by Thycotic
WHITE PAPER: According to Thycotic, 85% of breaches involve compromised endpoints. Explore this resource to learn about endpoint attacks and strategies for enhanced endpoint and application security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Thycotic
26 - 50 of 423 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement