IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
1 - 25 of 649 Matches Previous Page  |  Next Page
Modern Defense in Depth: An Integrated Approach to Better Web Application Security
sponsored by Oracle Dyn
WHITE PAPER: Cyberattacks are still successful. Breaches continue to occur. And each time we ask the same questions: why and how did this happen? Many businesses know the steps they're taking to protect ourselves are clearly inadequate. In this book, learn how an integrated, platform-based approach can help you achieve better web application security.
Posted: 22 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

Security with AI and Machine Learning
sponsored by Oracle Dyn
WHITE PAPER: Tools that employ AI and machine learning have begun to replace the older rules- and signature-based tools that can no longer combat today's sophisticated attacks. In this e-book, look at the strengths (and limitations) of AI- and ML-based security tools for dealing with today's threat landscape.
Posted: 22 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

Securing Web Applications
sponsored by Oracle Dyn
WHITE PAPER: Attacks on web applications can circumvent your security and harm your business in myriad ways by creating unwanted downtime, reducing availability and responsiveness, and shattering trust with your customers when data confidentiality and integrity is compromised.
Posted: 22 Mar 2019 | Published: 05 Jun 2018

Oracle Dyn

Making the Move to a Cloud Native WAF
sponsored by Oracle Dyn
WHITE PAPER: While many companies rely on appliance-based WAF solutions, the market requirements for web application security are shifting toward an edge security platform approach that combines a variety of protections suited to distributed cloud environments. Read this e-book and discover 5 reasons to consider a cloud-native web application firewall (WAF).
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Oracle Dyn

Seamless Application Security: Security at the Speed of DevOps
sponsored by Micro Focus
WHITE PAPER: Download this guide to learn how developers can start to leverage integrations to make application security a more natural part of the lifecycle – without slowing down innovation.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Micro Focus

Get Started with Seamless AppSec in One Day
sponsored by Micro Focus
WEBCAST: Listen to this webcast to learn how your development teams can learn to proactively integrate secure development practices into the dev process – without slowing down speed and innovation – to avoid leaving any potentially lethal gaps in security.
Posted: 21 Mar 2019 | Premiered: Mar 21, 2019

Micro Focus

Carnival Navigates Sea of Data With Splunk
sponsored by Splunk Services UK Ltd
CASE STUDY: In this case study, learn how Carnival Corporation deployed the Splunk platform to increase visibility across all systems, secure shipboard systems and protect customer data. Since deploying Splunk, Carnival has seen many benefits.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk Services UK Ltd

A Developer's Guide to the OWASP Top 10 2017
sponsored by Micro Focus
WHITE PAPER: Download this guide to learn how developers can enhance their secure coding skills and reduce application security risks by focusing on the OWASP top 10.
Posted: 20 Mar 2019 | Published: 20 Mar 2019

Micro Focus

Managing Non-Microsoft Security Updates
sponsored by Flexera Software
WHITE PAPER: Overlooking patches for vulnerabilities on non-Microsoft software is a great security risk for businesses. Despite the awareness of risk, organizations still struggle to identify, prioritize and deploy such patches. In this white paper, learn how to get the right patch management capabilities in place.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

Flexera Software

A Guide to AppSec in the Age of APIs & Microservices
sponsored by ThreatX
WHITE PAPER: DevOps and CI/CD pipelines are driving fast, continuous development and security needs to be able to keep pace without slowing down delivery or losing efficacy. Download this white paper to see how major shifts like these are impacting modern application security strategies today.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

ThreatX

2018-2019 Global Application & Network Security Report
sponsored by Radware
RESEARCH CONTENT: This 2018-2019 global application & network security report highlights the major themes shaping cybersecurity of late. Explore the report to help your organization keep its finger on the pulse of the rapidly evolving and increasingly dangerous cybersecurity landscape.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

Radware

Security for Cloud-Native Compute Will Be Different
sponsored by Aqua Security
WHITE PAPER: Access this brief to learn about security concerns associated with containers and serverless in the cloud, and what precautionary steps you can take now to mitigate any threats.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

Aqua Security

The Hacker Report
sponsored by HackerOne
WHITE PAPER: Many hackers are finding career building opportunities through bug bounties, with companies hiring from within the hacker community at a faster clip than ever before. As hacking grows in popularity, training continues to be a focus. Download this research report that details more than 300,000 individuals who represent the hacker community today.
Posted: 08 Mar 2019 | Published: 08 Mar 2019

HackerOne

The Pen Test Dilemma
sponsored by HackerOne
WHITE PAPER: Today typical pen test methodologies are falling behind the increasingly innovative methods used by criminals. Why? In this white paper, learn about 3 common issues with traditional pen tests and how your organization could benefit from conducting hacker-powered pen tests instead.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

HackerOne

Mobile App Security Testing Tools: Product Comparison
sponsored by WhiteHat Security
WHITE PAPER: Download this solution brief to compare several offerings from a suite of mobile app security testing options that utilize a combination of dynamic and static automated scanning.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

WhiteHat Security

2018 Secure DevOps: Fact or Fiction?
sponsored by WhiteHat Security
WHITE PAPER: You need to build application security into continuous delivery circles, but this requires a new way of thinking about app security. Dive into this whitepaper of DevSecOps to learn how to keep your DevOps app development process from repeating the same security mistakes of the recent past.
Posted: 07 Mar 2019 | Published: 31 Dec 2018

WhiteHat Security

Hacker-Powered Pen Tests and the Power of More
sponsored by HackerOne
WHITE PAPER: Like traditional penetration testing, a hacker-powered pen test like the HackerOne Challenge program runs for a fixed time period. But it also brings to bear the skills of up to thousands of hackers who probe your web applications for vulnerabilities. In this white paper, learn about the advantages of HackerOne Challenge.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

HackerOne

Securing Code with Advanced SAST
sponsored by WhiteHat Security
WHITE PAPER: Download this white paper to learn how a static application security testing (SAST) tool, can help your teams ensure that app code is secure – from development to pre-production – through effective scanning and remediation of vulnerabilities.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

WhiteHat Security

Application Security and How to Improve it
sponsored by WhiteHat Security
WHITE PAPER: UBM conducted an online survey to explore common trends and challenges in app security, and to understand how security and development teams can work together to close these gaps. Click here for an inside look at the survey results.
Posted: 06 Mar 2019 | Published: 31 Dec 2018

WhiteHat Security

Next-Gen Application Security
sponsored by HackerOne
WHITE PAPER: How do you get started with bug bounties and where do they fit in a DevOps workflow? Download this paper to find out.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

HackerOne

Securing Microservices in a DevOps World
sponsored by WhiteHat Security
WEBCAST: How can greater security be introduced when breaking down applications from monoliths into more manageable microservices? Jump into this webinar to find out how to overcome microservices security challenges such as the new rapid pace of release, authorization difficulties, and the importance of cloud-native applications.
Posted: 05 Mar 2019 | Premiered: Mar 5, 2019

WhiteHat Security

The No BS Guide to Static Application Security Testing (SAST)
sponsored by WhiteHat Security
WHITE PAPER: Network security is everywhere and we have all been hyperaware of securing the perimeter and having our firewalls on high alert. Now, application vulnerabilities are being exploited and it's time to do something about it. In this best practices guide, learn the steps to take towards implementing a successful application security program.
Posted: 04 Mar 2019 | Published: 04 Mar 2019

WhiteHat Security

Why Websites Stay Vulnerable: And What You Can Do About It
sponsored by WhiteHat Security
WEBCAST: There have been a number of data breaches in the news recently due to website vulnerabilities. In order to ensure your business isn't breached, incorporate security into your development process. In this webcast, explore key considerations for securing your web applications.
Posted: 01 Mar 2019 | Premiered: Mar 1, 2019

WhiteHat Security

Top 7 Reasons Why Organizations Choose WhiteHat Security
sponsored by WhiteHat Security
RESOURCE: In this infographic, find out the top 7 reasons organizations choose to work with WhiteHat Security.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

WhiteHat Security

Automating Security for DevOps: Best Practices for Securing the Continuous Integration and Continuous Delivery (CI/CD) Pipeline
sponsored by Symantec
WHITE PAPER: While organizations are interested in integrating security with DevOps processes, they find it difficult to find specifics on how to get started. In this best practices guide, learn how to leverage automation to assure the right cybersecurity measures are applied at each step of the CI/CD pipeline.
Posted: 26 Feb 2019 | Published: 26 Feb 2019

Symantec
1 - 25 of 649 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement