IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
1 - 25 of 660 Matches Previous Page  |  Next Page
Red Hat Video 6
sponsored by Red Hat
WEBCAST: Kubernetes accelerates application delivery, but it can also complicate security, visibility and compliance. With the right solutions, DevOps teams can reap the benefits of cloud-native infrastructure and keep risk low. Access this webinar to learn how 3 global companies avoided security and compliance issues using Red Hat OpenShift and Sysdig.
Posted: 09 Apr 2021 | Premiered: Dec 17, 2020

Red Hat

Red Hat Video 3
sponsored by Red Hat
WEBCAST: For organizations using OpenShift and Ansible – automated platforms for containerization and operations-based tasks, respectively – you may be wondering how to build additional security into your applications. Access this Red Hat webinar to learn how you can simplify security for these two platforms by leveraging CyberArk’s integrations.
Posted: 08 Apr 2021 | Premiered: Apr 8, 2021

Red Hat

Aqua Security Product Brief
sponsored by Red Hat
DATA SHEET: Aqua Security enables enterprises to secure their container applications from development to production – bridging the gap between DevOps and IT security. For Red Hat OpenShift Container Platform deployments, Aqua can add an extra layer of security. View this product brief to learn more about Aqua and Red Hat for containers.
Posted: 06 Apr 2021 | Published: 06 Apr 2021

Red Hat

Creating A Safe Environment For Under-Protected Apis
sponsored by Radware
WHITE PAPER: Learn how to create a safe environment for your under protected APIs and protect against the most common API attacks with Radware.
Posted: 06 Apr 2021 | Published: 06 Apr 2021

Radware

Securing the Cloud Crowdcast
sponsored by CrowdStrike
WEBCAST: Gartner says that by 2025, more than 85% of global organizations will be running containerized applications. Watch this webinar featuring CrowdStrike CTO Michael Sentonas as he discusses securing cloud workloads with DevSecOps practices and methodologies.
Posted: 06 Apr 2021 | Premiered: Apr 6, 2021

CrowdStrike

Protecting On-Premises Microsoft Exchange Servers
sponsored by TransientX, Inc
WHITE PAPER: On March 3, 2021 the US Government issued a directive to mitigate vulnerabilities with on-premises Microsoft Exchange servers due to a hack by a state-sponsored group Microsoft calls Hafnium. This day taught the lesson that VPN alone would not protect servers and data. Open this white paper to learn why zero trust can.
Posted: 02 Apr 2021 | Published: 02 Apr 2021


API Security 101: Your Expert Guide to API Defense
sponsored by TechTarget
RESOURCE: As organizations take measures against common vulnerabilities, hackers have set their sights on a new target: APIs. This e-guide shines a light on API risks and vulnerabilities, as well as the tactics forward-thinking businesses can use to stay secure.
Posted: 01 Apr 2021 | Published: 02 Apr 2021

TechTarget

Implementing Cloud Native Security: Shift-Left To Increase Effectiveness
sponsored by Palo Alto Networks
WHITE PAPER: Cloud security trends like “shift-left security” and “DevSecOps” refer to new strategies and paradigms that help organizations keep workloads secure in the age of cloud-based, scale-out, constantly changing applications and infrastructure. This guide explores what modern, shift-left security entails.
Posted: 24 Mar 2021 | Published: 13 Nov 2020

Palo Alto Networks

Ponemon Report: Application Security in the DevOps Environment
sponsored by HCL Software
EGUIDE: In this eguide, discover risks, consequences, and steps to acheiving a stronger application security posture in todays rapidly changing security landscape.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

HCL Software

Managing Application Security in a Global Enterprise A CISO’s Perspective
sponsored by HCL Software
VIDEO: Hear from the CISCO and VP of HCL Software about the everchanging security landscape, and the importance of application security.
Posted: 23 Mar 2021 | Premiered: 23 Mar 2021

HCL Software

Continuous Security – Putting it all Together
sponsored by HCL Software
EGUIDE: In this eguide, read through several diagrams explaining the key characteristics in the continuous security model.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

HCL Software

ESG Report
sponsored by HCL Software
EGUIDE: In this eguide, read about HCL AppScan and Continuous Applicaiton Security. Read through several challenges and a summary about why AppScan can be used for continuous application security.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

HCL Software

Go beyond Application Testing
sponsored by HCL Software
VIDEO: In this video, learn about what Continuous Security really is, and how this capability can be implemented into your organization.
Posted: 23 Mar 2021 | Premiered: 23 Mar 2021

HCL Software

Evaluating and Selecting AppSec Vendors to Fit Your Business Needs
sponsored by Veracode, Inc.
RESOURCE: The application security (AppSec) market is oversaturated with an abundance of options, which can make finding an AppSec vendor/offering best fit for your unique needs a difficult task. Read this infosheet for some expert guidance to help get you started on your AppSec journey.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

Veracode, Inc.

Top 10 Continuous Testing Myths
sponsored by HCL Software
EGUIDE: In this infographic, read through the top 10 Continuous Testing myths.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

HCL Software

Who is actually using Value Stream Management?
sponsored by HCL Software
VIDEO: In this webinar, learn more about Value Stream Management and why it is a hot topic for DevOps professionals who are trying adopt this process.
Posted: 22 Mar 2021 | Premiered: 22 Mar 2021

HCL Software

Go beyond Application Testing
sponsored by HCL Software
VIDEO: ph
Posted: 22 Mar 2021 | Premiered: 22 Mar 2021

HCL Software

Enabling teams ebook
sponsored by HCL Software
EGUIDE: In this eguide, learn how to achieve data visibility and how to use it to improve your DevOps Strategy.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

HCL Software

Value Stream Management Essentials
sponsored by HCL Software
EGUIDE: In this eguide, read about Value Stream Management (VSM) and how you can learn the essentials to start your value stream journey.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

HCL Software

CASB Cloud Application Visibility & Controls
sponsored by iBoss
WHITE PAPER: The ability to apply fine grained controls and gain visibility into cloud application use is critical with the move of applications to the cloud. View this white paper to learn how you can apply these controls to your organization’s CASB.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

iBoss

SAST vs. DAST: What Are the Differencesand Why Are They Both Important?
sponsored by Veracode, Inc.
RESOURCE: If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Veracode, Inc.

AppSec Stats Flash Podcast: Applying the 80/20 Rule for Web, API and mobile AppSec
sponsored by WhiteHat Security
WEBCAST: The application threat landscape is rapidly evolving – this means a more frequent analysis of application security policies. What steps can be taken to make apps more secure? Watch this webcast featuring a panel of industry experts as they provide key data points and trends and discuss what can be done to improve application security.
Posted: 19 Mar 2021 | Premiered: Feb 18, 2021

WhiteHat Security

Understanding Your Open Source Risk
sponsored by Veracode, Inc.
EBOOK: Developers are being asked to push out more software — and in shorter periods of time — than ever before. This has led to an increased reliance on open source libraries, and as this code is reused, it comes with a high risk of vulnerability. Access this e-book to learn more about the risks of open source and the challenges in securing it.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Veracode, Inc.

Get the Most Mileage Out of Your AppSec Program
sponsored by WhiteHat Security
WEBCAST: While formulating your race strategy to stay secure in 2021 and beyond, your security and development teams must be running at optimal performance to ensure vulnerabilities are identified and remediated. Join this webinar to learn how you can take your application risk management to the next level.
Posted: 17 Mar 2021 | Premiered: Mar 17, 2021

WhiteHat Security

Tips to Follow onYour AppSec Journey
sponsored by Veracode, Inc.
RESOURCE: Best practices don’t become best practices overnight. There are first steps to take for each, not least in application security. So for processes such as testing, shifting left and vulnerability management, how can you start? Access this infographic to learn 5 AppSec best practices and 5 practical first steps to each.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

Veracode, Inc.
1 - 25 of 660 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info