IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
1 - 25 of 653 Matches Previous Page  |  Next Page
Workload Security: Visibility and Analysis for Cloud and Container Workloads
sponsored by Lacework
PRODUCT OVERVIEW: The modern cloud infrastructure requires a shift in the approach to workload security. Download this solution brief to learn more about Lacework’s automated approach to enabling visibility and analysis for cloud and container workloads.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Lacework

Jitterbit Secures Dynamic Cloud Environment, Containers, and Microservices at Scale.
sponsored by Lacework
CASE STUDY: In this case study, discover how Jitterbit, and API service provider, was able to address issues related to monitoring activity within their expanding platform by partnering with Lacework to enable holistic activity tracking, streamlined compliance reporting and comprehensive security – without disruption.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Lacework

Webinar: Application Fluency through Automated SD-WAN
sponsored by Oracle Communications
WEBCAST: How can software-defined networking optimize network architecture to enhance application performance? This Doyle Research webcast, presented by Oracle, gives an overview of SD-WAN and how it helps you get the most out of your mission-critical apps.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Oracle Communications

Wavefront Secures DevOps Environments at Scale with Lacework
sponsored by Lacework
CASE STUDY: Due to the continually changing nature of their public cloud environment, Wavefront was facing visibility and security issues related to detecting and tracking vulnerabilities and threats. Download this white paper to see what led to their partnership with Lacework, as well as the results.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

Lacework

Carson Living Secures Rapidly Growing Cloud Environment
sponsored by Lacework
CASE STUDY: Due to the rapid growth in adoption (400% in the past year) of their AWS-hosted application, Carson Living was facing issues related to ensuring cloud compliance and maintaining security configurations. Download this white paper to see what led to their partnership with Lacework, as well as the results.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

Lacework

The CISO Speaks: Insights from the Frontlines
sponsored by RSA Conference
EBOOK: In today’s increasingly complex cybersecurity landscape, CISOs play an essential role both within the C-suite and across multiple critical areas of an organization. With more cybersecurity professionals looking to CISOs for insights on the latest challenges and trends, RSA Conference blogger Tony Kontzer conducts Q&As with today’s leaders.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

RSA Conference

The 5 Most Dangerous New Attack Techniques and How to Counter Them
sponsored by RSA Conference
VIDEO: What are the most dangerous new techniques attackers are employing? This fast-paced briefing features three experts from the SANS Institute best-positioned to provide answers: the nation’s top expert on mobile forensics, the director of the Internet Storm Center and the top hacker exploits expert in the US.
Posted: 07 Jul 2020 | Premiered: 28 Feb 2020

RSA Conference

Auth0 Platform Introduction
sponsored by Auth0
WEBCAST: This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.
Posted: 02 Jul 2020 | Premiered: Jul 2, 2020

Auth0

CIO Trends #11: Benelux
sponsored by ComputerWeekly.com
EGUIDE: The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

ComputerWeekly.com

Why AWS + Auth0
sponsored by Auth0
WHITE PAPER: Implementing the right IAM or customer IAM tool in your AWS ecosystem requires thoughtful planning. This 52-page white paper provides a comprehensive collection of expertise, best practices and project planning insights for using AWS & Auth0 to set up an API gateway and protect your critical applications.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Auth0

Mistakes to Love: A Survey of Identity Mistakes
sponsored by Auth0
WHITE PAPER: For leading application development teams, there seems to be debate around buying vs building. The following report provides in-depth insights from a survey into the successes and failures of identity professionals across their identity projects – both bought and build. Read on to unlock the key findings.
Posted: 01 Jul 2020 | Published: 01 Jul 2020

Auth0

Web and Mobile Application Security Testing Solution Brief
sponsored by WhiteHat Security
PRODUCT OVERVIEW: According to the NTT 2020 Global Threat Intelligence Report, 55% of all attacks last year were application specific. Named a leader in a recent Gartner Magic Quadrant report, WhiteHat offers an application security testing bundle – designed to automate testing across the entire DevOps lifecycle. Download this solution brief to learn more.
Posted: 30 Jun 2020 | Published: 30 Jun 2020

WhiteHat Security

The Maturity of Zero Trust in Europe
sponsored by Okta
RESOURCE: While only 18% of organizations in Europe have a defined strategy along Zero Trust principles, 93% of European organizations polled had implemented at least one security solution that mapped to a Zero Trust strategy. How does your organization compare regarding Zero Trust? View this infographic to learn how Europe is enhancing security.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Okta

2020: The State of Endpoint Resilience Report
sponsored by Absolute Software Corporation
ANALYST REPORT: In this research report, 2020: The State of Endpoint Resilience Report, explore insights designed to help enterprises strengthen their security posture, and build the resilience needed to continue to face today’s cyber challenges head on.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Absolute Software Corporation

Identity as a Service for Dummies
sponsored by Okta
EGUIDE: According to the Okta 2020 “Businesses @ Work” report, the average number of apps per organization is currently 88, and the growth rate over the past 3 years has been 21 percent. Using this helpful guide, learn how companies are leveraging IDaaS to make IAM more scalable, more flexible and more cost effective.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Okta

ITProTV | CompTIA PenTest+: Analyze Scripts: Python
sponsored by Cornerstone OnDemand
VIDEO: This video will walk you through how to analyze Python scripts for the CompTIA PenTest+: and will explain the foundational knowledge of Python so that you are better equipped to write scripts and analyze and discern the purpose of scripts you come into contact with. Tune in to start your test prep.
Posted: 26 Jun 2020 | Premiered: 26 Jun 2020

Cornerstone OnDemand

ITProTV | Microsoft AZ 500: Create, Configure, Network, App Security Groups
sponsored by Cornerstone OnDemand
WEBCAST: In this video, learn what Network Security Groups and Application Security Groups are, and explore the 7 steps required to filter network traffic with a network security group using the Azure Portal.
Posted: 25 Jun 2020 | Premiered: Jun 25, 2020

Cornerstone OnDemand

Cequence Security: API Sentinel Podcast
sponsored by Cequence
PODCAST: Tune into this podcast from Cequence Security to learn how API Sentinel can help you identify all your APIs, uncover security risks and address them to eliminate potential fraud or data loss.
Posted: 25 Jun 2020 | Premiered: Jun 15, 2020

Cequence

5 Misconceptions About Dynamic Application Security Testing (DAST) for Mobile
sponsored by NowSecure
RESOURCE: Dynamic Application Security Testing (DAST) plays a critical role in any mobile app security and privacy program. However, long-held misconceptions create confusion, leading to slower and infrequent testing. Read this article to bust 5 common misconceptions about DAST for mobile.
Posted: 25 Jun 2020 | Published: 25 Sep 2019

NowSecure

12 Reasons Why You Need Stronger Mobile App Security
sponsored by NowSecure
RESOURCE: Whether it’s for internal communication, enhancing customer experience or part of a digital transformation initiative, mobile applications play a critical role and ensuring their protection is paramount. Download this infographic to discover 12 reasons why organizations need stronger mobile app security strategies.
Posted: 22 Jun 2020 | Published: 22 Jun 2020

NowSecure

How to Ensure NIAP Mobile Application Compliance
sponsored by NowSecure
WHITE PAPER: Mobile applications allow for improved business operations and more seamless experience. However, for federal agencies, the heavy burden of ensuring each app meets the National Information Assurance Partnership (NIAP) security requirements causes a massive roadblock. Download this white paper to learn ease this headache.
Posted: 19 Jun 2020 | Published: 19 Jun 2020

NowSecure

Get Started with Application Security in 3 Easy Steps
sponsored by Micro Focus
WHITE PAPER: It’s a common misconception that application security strategies are inherently disruptive to productivity. As organization rely more on apps for communication, security becomes paramount. The following guide provides 3 easy steps to help you get started with application security, read on to get started.
Posted: 17 Jun 2020 | Published: 17 Jun 2020

Micro Focus

Six Steps to Comprehensive Container Security in AWS
sponsored by Trend Micro
WHITE PAPER: Containers grant developers the power to create and deliver applications faster and more consistently. But, as with any technology, there’s a catch. Containers can also increase infrastructure complexity, which in turn leads to overlooked security gaps. In this guide, find 6 steps you can take toward comprehensive container security in AWS.
Posted: 16 Jun 2020 | Published: 16 Jun 2020

Trend Micro

3 Powerful Ways to Slash Mobile App Security Costs
sponsored by NowSecure
WHITE PAPER: There’s never a bad time to find ways to cut costs, enhance productivity and expand security capabilities – especially when it comes to the constantly evolving mobile application landscape. Download this white paper to review 3 scenarios that showcase how automating mobile app security testing can save money while fostering productivity.
Posted: 15 Jun 2020 | Published: 15 Jun 2020

NowSecure

Infographic: Inside the Mobile Attack Surface
sponsored by NowSecure
RESOURCE: As mobile applications continue to play a critical role in communication, productivity and user experience, ensuring security becomes increasingly important. Download the following infographic for an overview of the mobile application attack surface, which includes common areas for potential privacy and security gaps.
Posted: 15 Jun 2020 | Published: 15 Jun 2020

NowSecure
1 - 25 of 653 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info