IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by, powered by an online computer dictionary
Application Security White Papers (View All Report Types)
76 - 100 of 434 Matches Previous Page  |  Next Page
Hackers Have Moved onto the Cloud Exploiting OAuth
sponsored by Cisco Umbrella
WHITE PAPER: In the wrong hands, OAuth can be a weapon. Access this infographic to gain insight into the recent Google OAuth attack, the growing risk, and what can be done to protect your organization from similar attacks.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

Cisco Umbrella

Your Guide to HIPAA Compliance for Containers
sponsored by Twistlock, Inc.
WHITE PAPER: With the advent of microservices it is likely that many new healthcare apps are being built with containers. Discover how to achieve compliance with the HIPAA Security Rule for containerized workloads for healthcare apps.
Posted: 20 Jul 2017 | Published: 20 Jul 2017

Total Cost of Ownership of the CloudBees Jenkins Platform
sponsored by Cloudbees
WHITE PAPER: Explore how to augment open source Jenkins software with CloudBees and foster DevOps practices within your organization. Learn more about the CloudBees Jenkins Platform, how it replaces the manual aspects of running Jenkins with automation, and the platform's total cost of ownership.
Posted: 18 Jul 2017 | Published: 31 Dec 2016


Using the Pipeline Plugin to Accelerate Continuous Delivery
sponsored by Cloudbees
WHITE PAPER: Uncover an introduction and step-by-step guide for using the Jenkins Pipeline plugin to automate the software lifecycle and achieve continuous delivery. Access tips for everything from installing and creating a pipeline to scaling and securing it.
Posted: 18 Jul 2017 | Published: 31 Dec 2016


The Spectrum of Mobile Risk: Understanding the Full Range of Risks to Enterprise Data From Mobility
sponsored by Lookout
WHITE PAPER: Download this white paper to discover a mobile risk matrix that will help organizations understand the prevalence of mobile risk surrounding software vulnerabilities, mobile app threats, behavior and configurations and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017


Application Security Buyers Guide: 15 Requirements
sponsored by Rapid7
WHITE PAPER: In this white paper, learn the 15 elements you need to make sure an application scanning vendor has before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017


7 Questions to Ask Your Dynamic Application Security Scanning Vendor
sponsored by Rapid7
WHITE PAPER: In this white paper, learn 7 questions you should ask any application security vendor about their dynamic application security testing (DAST) capabilities before making a purchasing decision.
Posted: 06 Jun 2017 | Published: 06 Jun 2017


When Software Goes Rogue
sponsored by BDNA
WHITE PAPER: How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.
Posted: 02 Jun 2017 | Published: 31 May 2017


Safe Adoption of Cloud Applications
sponsored by Symantec
WHITE PAPER: Gartner predicts that nearly 40% of enterprise IT application spend will be shifted to cloud versus on-premise by 2020. Access this white paper for major considerations you will need to focus on when looking for cloud app security.
Posted: 26 May 2017 | Published: 26 May 2017


Mobile, Cloud & Desktop Security: 3 Keys to Digital Success
sponsored by MobileIron
WHITE PAPER: What's holding so many organizations back from using mobile to its full potential? Mobile, cloud, and desktop security. Access this white paper to learn how to protect your critical data on any device, network, or cloud service so you can focus on delivering business value instead of reacting to security threats and fighting fires.
Posted: 05 May 2017 | Published: 30 Dec 2016


The Top 6 WAF Essentials to Achieve Application Security Efficacy
sponsored by Citrix
WHITE PAPER: Due to the nature of web security and how it constantly evolves, it is increasingly difficult to integrate comprehensive security into applications and keep them up-to-date. In this white paper, learn the 6 essential features your web application firewall (WAF) needs to maintain a high degree of security,
Posted: 27 Apr 2017 | Published: 27 Apr 2017


Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016


Cyber security solutions from IBM
sponsored by IBM
WHITE PAPER: Government agencies rely on the Internet to store large amounts of data. As a result, internal and external threats are a growing concern for personal and valuable information. This informative white paper offers cyber security solutions to ensure protection.
Posted: 28 Aug 2017 | Published: 20 Jul 2012


How to Secure Your Organization's Data in SaaS Apps
sponsored by OneLogin
WHITE PAPER: According to Cisco, IT departments are only aware of about 7% of their company's cloud app usage, leading to a massive security blind spot. Discover 10 steps on how to track sensitive corporate data in third-party SaaS apps and ensure that only the right people have the right level of access to it.
Posted: 17 Jul 2017 | Published: 17 Jul 2017


IAM Case Study: How to Maximize Your ROI and Security
sponsored by OneLogin
WHITE PAPER: Security and ROI don't have to be antagonistic. Learn how one company achieved a 482% ROI with their IAM over the course of three years, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017


Solution Brief - Securing the mobile enterprise
sponsored by IBM
WHITE PAPER: Discover a comprehensive portfolio of mobile security systems that address four key mobile security challenges: protecting devices, securing content and collaboration, safeguarding applications and data, and managing access and fraud. The portfolio also includes a layer of security intelligence for advanced threat detection.
Posted: 08 Mar 2017 | Published: 06 Mar 2017


The New BYOD: 5 Best Practices for a Productive BYOD Program
sponsored by vmware airwatch
WHITE PAPER: Today's savviest enterprises are leveraging BYOD as a tool to drive mobile accessibility, increase IT oversight, and enable employees to complete business tasks anytime, anywhere, on any device. This white paper outlines the basic measures business leaders and IT professionals are taking to turn their BYOD programs into major productivity gains.
Posted: 08 Mar 2017 | Published: 07 Mar 2017

vmware airwatch

EMM Real Benefits in Today's Mobile World
sponsored by vmware airwatch
WHITE PAPER: The economy isn't standing still. For your business to succeed, your employees shouldn't either. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

Five Key Indicators that You Need to Adopt EMM Now
sponsored by vmware airwatch
WHITE PAPER: How do you know if your organization is ready to make the move to enterprise mobility management (EMM)? Read this white paper to determine if it is the right time to adopt EMM, especially if your organization experiences: Increased need for security and compliance, device expansion or rapid growth.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

The Massive Mobile Migration
sponsored by IBM
WHITE PAPER: The move to mobile devices, data and apps to make work happen anytime, anywhere is continuing to experience massive adoption. Download this infographic to see the numbers you can't ignore this year.
Posted: 03 Mar 2017 | Published: 27 Apr 2016


Magic Quadrant for Application Security Testing
sponsored by IBM
WHITE PAPER: In this analyst report, learn about how 19 application security testing (AST) vendors fared in a comparison of their strengths and cautions. Discover which one is right for your organization.
Posted: 15 Feb 2017 | Published: 15 Feb 2017


Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

QRAT Malware-As-A-Service
sponsored by Booz Allen Hamilton
WHITE PAPER: QRAT, a new remote access tool, first emerged in 2015 and is now targeting U.S. visa applicants via Skype's messenger service. Discover why QRAT is dangerous and how it can infect your system within this valuable white paper. Learn who's behind the QRAT tool, where it originated and why it may be targeting you right now.
Posted: 24 Oct 2016 | Published: 30 Jun 2016

Booz Allen Hamilton

Top 5 Applications You Should Blacklist Now
sponsored by Thycotic
WHITE PAPER: Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Gain the best practices for restricting malicious software.
Posted: 18 Oct 2016 | Published: 18 Oct 2016


Neustar DDOS Attacks & Protection Report: North America & EMEA The Continuous Risk to Digital Brands
sponsored by Neustar
WHITE PAPER: This report encapsulates the survey results of 760 CSOs, CIOs, CTOs and others in IT security. Its purpose is to learn how companies in North America and the EMEA region (Europe, the Middle East, and Africa) encounter and defend against DDoS attacks.
Posted: 28 Sep 2016 | Published: 31 Dec 2015

76 - 100 of 434 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement