IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
1 - 25 of 692 Matches Previous Page  |  Next Page
Eliminate Infrastructure as Code Vulnerabilities at the Source
sponsored by Concourse Labs
DATA SHEET: Download this brief for the key risks associated with Infrastructure as Code (IaC) and get practical tips for demonstrating your cloud security and compliance posture, at every point in time.
Posted: 21 Oct 2020 | Published: 21 Oct 2020

Concourse Labs

Protecting the User: A Review of Mimecast’s Web Security Service
sponsored by Mimecast
ANALYST REPORT: Web browsers and email clients remain the most common points of entry and attack. Despite security awareness training and increasingly intelligent controls, unsuspecting employees are in the firing line for a bevy of developing cyberthreats. Fight back – view this SANS report to read a review of Mimecast’s Web Security service.
Posted: 20 Oct 2020 | Published: 31 Dec 2019

Mimecast

VMware NSX Advanced Load Balancer
sponsored by VMware
ANALYST REPORT: Do you experience major fluctuations in internet traffic? Instead of purchasing, installing, and supporting appliance-based load balancers to direct your organization’s web traffic, you can turn to a software-defined solution. Dive into this report to read the science behind VMware’s NSX Advanced Load Balancer.
Posted: 14 Oct 2020 | Published: 30 Apr 2020

VMware

How to Control Outbound Traffic to the Internet Using Egress Filtering
sponsored by Aviatrix Systems
WEBCAST: In this webcast, Tyrone Philip and Neil Robinson from ReAssure talk about the challenges they faced using native services that filter on IP address lists that regularly change or open source solutions with limited central control and visibility. Download the webcast to learn more.
Posted: 14 Oct 2020 | Premiered: Oct 14, 2020

Aviatrix Systems

Aviatrix Policy-Based Egress FQDN Filtering Solution
sponsored by Aviatrix Systems
DATA SHEET: Cloud applications with unrestricted access to Internet-based services expose your environment to risk, compliance violations and data exfiltration. In this brief, learn how Aviatrix Egress FQDN Filtering can help centralize control over Internet-bound traffic from VPCs or VNets using Fully Qualified Domain Name (FQDN) filtering.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

Aviatrix Systems

Aruba Policy Enforcement Firewall — Cyber Catalyst Designation
sponsored by TechData
RESOURCE: In this quick fact sheet, find out how the Aruba Policy Enforcement Firewall is designed to be a key component of any organization’s zero-trust architecture.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

TechData

Analyst Report: Web Application Firewalls
sponsored by Akamai Technologies
ANALYST REPORT: Web applications firewalls (WAFs) are fundamental in application security, but as customer requirements are changing, WAF vendors are being asked for more. Broader attack defense, integration with security infrastructure and detection and response are among these requirements. Read this Forrester Wave report to see how 10 WAF leaders stack up.
Posted: 13 Oct 2020 | Published: 06 Mar 2020

Akamai Technologies

How to Successfully Secure Ecommerce
sponsored by Rackspace
WEBCAST: With more and more business transacted online, and with cyberthreats growing more and more complex, businesses need to find ways to optimize the performance of their websites without compromising security or falling short of compliance. Watch this webinar presented by Rackspace and Akamai for a guide through this challenge.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

Rackspace

Why Commercial Support Improves Security and Stability For Organizations Using Open Source
sponsored by Red Hat
ANALYST REPORT: Open source software (OSS) can be complicated by security and compliance concerns, lack of talent, and a complexity of projects and vendors. Most organizations using OSS require commercial support, such as stability and security enhancements or certification for hardware. Learn more in this analyst paper from 451 Research.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Red Hat

Don't be Afraid of Cloud Security
sponsored by Apcela
WEBCAST: The push to move applications and services to the cloud often opens security vulnerabilities that you read about as headlines. Conversely, the fear of these security events results in network policy that inhibits the speed and performance of business. Watch this webcast for a discussion on balancing speed and security from a CIO’s perspective.
Posted: 07 Oct 2020 | Premiered: Oct 31, 2019

Apcela

Secure, Connected Digital Workplace
sponsored by TATA Communications
WHITE PAPER: The world of IT has undergone more transformation in the past six months than many could have predicted, but that doesn’t mean that organizations will be smooth-sailing when the pandemic is over. Businesses must continue to plan for the unexpected. Read this white paper to understand what to prioritize when it comes to post-COVID operations.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

TATA Communications

Leading the Way with Secure Mobile Keyless Hotel Access
sponsored by Armor
CASE STUDY: The Trustwave Global Security Report lists the hospitality industry as one of the top five industries subjected to network breaches. Customer data is sensitive but attainable for threat actors, and developers must use caution when developing keyless hotel access. Read this case study to learn how one business balanced usability and security.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Armor

Rethink Firewalls: The Compelling Economic Case for Software-Based Segmentation
sponsored by Guardicore
WHITE PAPER: Why are IT and security teams still relying on legacy firewalls to do internal network segmentation? As policy-protected applications and segments proliferate, physical firewall appliances are proving ineffective in today’s increasingly dynamic hybrid-cloud environments. Read this white paper to learn about software-based segmentation.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Guardicore

Real Estate Tech Giant Drives New Revenue Streams with Google Cloud's Apigee
sponsored by SoftServe
CASE STUDY: The fear of exposing APIs to external actors can hold you back. The best way to move forward without fear is with the right API security solution. Learn how the world’s largest real estate technology franchise invested in API security to enhance the customer experience without putting their business or their customers in danger.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

SoftServe

11-Minute Webinar: Strategies to Work from Anywhere
sponsored by Okta
WEBCAST: Telework involves more than getting your employees up and running with video conferencing – it requires a massive shift in how people work and how you think about securing users and their devices. Don’t float adrift in a sea of distributed workforce challenges – watch this 10-minute webinar and learn how to manage access and security.
Posted: 30 Sep 2020 | Premiered: Jul 24, 2020

Okta

Product Brief: Endpoint Agent
sponsored by Sinefa
WHITE PAPER: Security managers and professionals need endpoint monitoring that allows them to gain actionable insights into end user experience and troubleshoot problems. Most of all, these professionals need visibility over their networks so that they can work to optimize performance. Read this white paper to learn about Sinefa’s Endpoint Agent.
Posted: 24 Sep 2020 | Published: 24 Sep 2020

Sinefa

AppSec for the Newly Hired CISO/CSO
sponsored by Contrast Security
EBOOK: For new CISOs and CSOs, the tasks and demands of the new role can be overwhelming – especially as digital transformation changes conventional approaches to application security. Read this e-book for AppSec guidance and best practices for new CISO/CIOs.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Contrast Security

2020 Application Security Observability Report
sponsored by Contrast Security
WHITE PAPER: Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.
Posted: 21 Sep 2020 | Published: 13 Jul 2020

Contrast Security

The Evolution of Application Fraud
sponsored by F5 Networks
RESOURCE: Cyberattacks targeting business applications have been on the rise in recent years – an issue made exponentially more prominent as web applications grew in popularity due to COVID-19 changes. This resource provides an overview of the evolution of application fraud – read on to get started.
Posted: 18 Sep 2020 | Published: 18 Sep 2020

F5 Networks

Credential Stuffing 2020: Attack Tools and Trends
sponsored by F5 Networks
VIDEO: Recently emerging as one of the most prominent threats targeting web applications, credential stuffing has found its way into news headlines and mainstream media. This webinar provides an overview of the current credential stuffing trends and tactics – highlighting how the threat has evolved over the years.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

F5 Networks

Application Security with NGINX
sponsored by NGINX
WEBCAST: In today’s unpredictable security environment, organizations need to know how to implement effective security controls for their application infrastructure without impacting release velocity or application performance. In this webcast, learn how you can do just this, with specific business use cases as evidence.
Posted: 15 Sep 2020 | Premiered: Aug 5, 2020

NGINX

Application Paranoia
sponsored by HCL Software
AUDIO FILE: In episode 9 of Application Paranoia, the hosts discuss how “open” the devices we use really are at an application level, explain why prepared statements are better than executing queries, and interview a security director of application security at a large multinational organization.Access it here.
Posted: 09 Sep 2020 | Published: 17 Aug 2020

HCL Software

What Every Security Professional Should Know About Third-Party OAuth Apps
sponsored by Proofpoint
WHITE PAPER: For CISOs, permitting third-party apps is a constant struggle, especially given the expansive use of cloud applications. What’s important is that security professionals in authentication are up to speed on what keeps a cloud account safe from OAuth attacks. Take a look at this FAQ/checklist to be informed on the risks of third-party apps.
Posted: 08 Sep 2020 | Published: 03 Sep 2020

Proofpoint

Equifax Success in Security Transformation
sponsored by Sonatype
CASE STUDY: Access this case study to learn how Equifax achieved a security transformation through Sonatype Nexus Life cycle and Nexus Repository.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Sonatype

Top 10 Considerations When Selecting a Software Composition Analysis (SCA) Solution
sponsored by Sonatype
WHITE PAPER: With so much at stake using open source code, it is important that you choose the perfect software composition analysis (SCA) solution for your needs. Access this white paper to learn the top 10 considerations when choosing an SCA solution.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Sonatype
1 - 25 of 692 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info