IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
1 - 25 of 609 Matches Previous Page  |  Next Page
Demystifying DevSecOps practices and tooling in container environments
sponsored by Red Hat
VIRTUAL SEMINAR: Red Hat believes that the purest DevOps out there is DevSecOps, which requires a cultural transformation. Watch the webinar to learn about DevSecOps practices and tools in container environments.
Posted: 13 Aug 2021 | Premiered: 13 Aug 2021

Red Hat

Reaching the Tipping Point of Web Application and API Security
sponsored by Fastly
ANALYST REPORT: Traditional application security (AppSec) approaches are becoming increasingly ineffective at protecting modern web applications and API architectures. Access this exclusive ESG Research Insights Paper to learn more about the modern AppSec challenges and best practices.
Posted: 02 Aug 2021 | Published: 02 Aug 2021

Fastly

Webinar: Connect FinTech to Core Banking Data
sponsored by AWS & Trustgrid
VIDEO: Cloud-based applications have become the standard for new FinTech architectures. However, this presents some unique challenges for data access, security, and integration. This webinar discusses how FinTech applications providers are reimagining the way they access and secure core banking data with data mesh – watch now to get started.
Posted: 27 Jul 2021 | Premiered: 04 Mar 2020

AWS & Trustgrid

3 ways a bug bounty platform delivers agile transformation
sponsored by YesWeHack
WHITE PAPER: In the digital age, manual penetration testing (pen-testing) is no longer a viable option for addressing application vulnerabilities. Instead, leaders are turning to bug bounty platforms, which provide crowdsourced pen-testing-as-a-service. Read this white paper to learn more about bug bounty platforms.
Posted: 08 Jun 2021 | Published: 08 Jun 2021

YesWeHack

Contrast Protect: Runtime Application Protection And Observability
sponsored by Contrast Security
RESOURCE: Contrast Protect is a runtime application protection and observability solution that uses real-time analysis of application runtime events to confirm exploitability before taking action to block an attack. Download this solution brief to learn more about the capabilities and benefits of Contrast Protect.
Posted: 07 Jun 2021 | Published: 07 Jun 2021

Contrast Security

Name-Based Data Matching Is Only Moderately Better Than Not Scanning At All
sponsored by Sonatype
CASE STUDY: The application security team within a top tier financial services corporation invited Sonatype and another application security vendor to scan a core set of applications critical to their production applications. Read on to find out what the company found.
Posted: 07 Jun 2021 | Published: 07 Jun 2021

Sonatype

Develop Smarter, Not Harder
sponsored by Sonatype
EBOOK: Download this demo book to learn about the benefits of using Sonatype's open source tools.
Posted: 04 Jun 2021 | Published: 04 Jun 2021

Sonatype

The Consequences of Poor Authentication and Authorization Practices in APIs
sponsored by Traceable
RESOURCE: In this article, uncover examples of real-world API vulnerabilities (Shopify and Facebook) to understand how attackers could breach your defenses. And uncover what to look for when designing and building your authentication (authN) and authorization (authZ) system.
Posted: 11 May 2021 | Published: 11 May 2021

Traceable

State Of Software Security
sponsored by Veracode, Inc.
ANALYST REPORT: Developers are under constant pressure to meet deadlines to deploy effective applications. It goes without saying – this is bound to cause a few problems. Access this report to understand the current state of software security. Learn about the most recurrent application flaws, open source flaws and what can be done to ‘fix’ software security.
Posted: 27 Apr 2021 | Published: 31 Dec 2020

Veracode, Inc.

Veracode Security Labs
sponsored by Veracode, Inc.
WHITE PAPER: Software developers are the only ones who can fix vulnerabilities in their code. Yet they aren’t often trained to identify or remediate vulnerabilities – or code securely, for that matter. Now, Veracode might have what you need. Download this white paper to discover a plethora of security trainings on today’s most relevant AppSec topics.
Posted: 27 Apr 2021 | Published: 31 Mar 2021

Veracode, Inc.

The Prosimo SLA Value
sponsored by Prosimo
WHITE PAPER: One of today’s critical business functions is delivering a fast, reliable and secure application experience, but enterprise cloud architects and operations teams have limited observability and control across hybrid and multi-cloud environments. View this white paper to learn how per-application SLAs can mitigate this issue.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

Prosimo

Two Fortune 500 Financial Institutions
sponsored by Prosimo
CASE STUDY: Two large Fortune 500 financial institutions in the US and UK had local branches connected using VPLS/MPLS trunks links. With staff working remotely, they looked for alternative options to reduce the cost of transport and reliably deliver low-latency secure access. View this case study to learn how Prosimo was able to help.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

Prosimo

Leading U.S. Car Manufacturer
sponsored by Prosimo
CASE STUDY: A leading U.S. car manufacturer was managing multiple VPN solutions in various locations to connect to a specific European-hosted application for users across 3 continents, leading to disconnections and poor performance abound. View this case study to learn how Prosimo helped this manufacturer improve experience for its distributed workforce.
Posted: 14 Apr 2021 | Published: 14 Apr 2021

Prosimo

Creating A Safe Environment For Under-Protected Apis
sponsored by Radware
WHITE PAPER: Learn how to create a safe environment for your under protected APIs and protect against the most common API attacks with Radware.
Posted: 06 Apr 2021 | Published: 06 Apr 2021

Radware

Securing the Cloud Crowdcast
sponsored by CrowdStrike
WEBCAST: Gartner says that by 2025, more than 85% of global organizations will be running containerized applications. Watch this webinar featuring CrowdStrike CTO Michael Sentonas as he discusses securing cloud workloads with DevSecOps practices and methodologies.
Posted: 06 Apr 2021 | Premiered: Apr 6, 2021

CrowdStrike

Protecting On-Premises Microsoft Exchange Servers
sponsored by TransientX, Inc
WHITE PAPER: On March 3, 2021 the US Government issued a directive to mitigate vulnerabilities with on-premises Microsoft Exchange servers due to a hack by a state-sponsored group Microsoft calls Hafnium. This day taught the lesson that VPN alone would not protect servers and data. Open this white paper to learn why zero trust can.
Posted: 02 Apr 2021 | Published: 02 Apr 2021


API Security 101: Your Expert Guide to API Defense
sponsored by TechTarget
RESOURCE: As organizations take measures against common vulnerabilities, hackers have set their sights on a new target: APIs. This e-guide shines a light on API risks and vulnerabilities, as well as the tactics forward-thinking businesses can use to stay secure.
Posted: 01 Apr 2021 | Published: 02 Apr 2021

TechTarget

Implementing Cloud Native Security: Shift-Left To Increase Effectiveness
sponsored by Palo Alto Networks
WHITE PAPER: Cloud security trends like “shift-left security” and “DevSecOps” refer to new strategies and paradigms that help organizations keep workloads secure in the age of cloud-based, scale-out, constantly changing applications and infrastructure. This guide explores what modern, shift-left security entails.
Posted: 24 Mar 2021 | Published: 13 Nov 2020

Palo Alto Networks

Evaluating and Selecting AppSec Vendors to Fit Your Business Needs
sponsored by Veracode, Inc.
RESOURCE: The application security (AppSec) market is oversaturated with an abundance of options, which can make finding an AppSec vendor/offering best fit for your unique needs a difficult task. Read this infosheet for some expert guidance to help get you started on your AppSec journey.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

Veracode, Inc.

CASB Cloud Application Visibility & Controls
sponsored by iBoss
WHITE PAPER: The ability to apply fine grained controls and gain visibility into cloud application use is critical with the move of applications to the cloud. View this white paper to learn how you can apply these controls to your organization’s CASB.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

iBoss

SAST vs. DAST: What Are the Differencesand Why Are They Both Important?
sponsored by Veracode, Inc.
RESOURCE: If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Veracode, Inc.

AppSec Stats Flash Podcast: Applying the 80/20 Rule for Web, API and mobile AppSec
sponsored by WhiteHat Security
WEBCAST: The application threat landscape is rapidly evolving – this means a more frequent analysis of application security policies. What steps can be taken to make apps more secure? Watch this webcast featuring a panel of industry experts as they provide key data points and trends and discuss what can be done to improve application security.
Posted: 19 Mar 2021 | Premiered: Feb 18, 2021

WhiteHat Security

Understanding Your Open Source Risk
sponsored by Veracode, Inc.
EBOOK: Developers are being asked to push out more software — and in shorter periods of time — than ever before. This has led to an increased reliance on open source libraries, and as this code is reused, it comes with a high risk of vulnerability. Access this e-book to learn more about the risks of open source and the challenges in securing it.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Veracode, Inc.

Get the Most Mileage Out of Your AppSec Program
sponsored by WhiteHat Security
WEBCAST: While formulating your race strategy to stay secure in 2021 and beyond, your security and development teams must be running at optimal performance to ensure vulnerabilities are identified and remediated. Join this webinar to learn how you can take your application risk management to the next level.
Posted: 17 Mar 2021 | Premiered: Mar 17, 2021

WhiteHat Security

Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.
Posted: 19 Jul 2021 | Published: 20 Jul 2021

ComputerWeekly.com
1 - 25 of 609 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences