IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
1 - 25 of 845 Matches Previous Page  |  Next Page
Security Best Practices for the Diamanti Bare-Metal Container Platform
sponsored by Diamanti
WHITE PAPER: Containers have revolutionized the way you can develop and deploy software, but they also require a revolution in the way you think about protecting your applications. Download this whitepaper for key security characteristics, whether you're running Docker or Kubernetes, and best practices and tools to protect your containers from outside threats.
Posted: 23 Apr 2018 | Published: 23 Apr 2018

Diamanti

Access Management Handbook
sponsored by Gemalto
EBOOK: When each cloud app uses its own login information, it creates a hassle for both users and IT. This handbook offers information on access management, and authentication protocols integral to maintaining a simple and secure cloud environment.
Posted: 20 Apr 2018 | Published: 16 Aug 2017

Gemalto

Security's Password Crisis
sponsored by Centrify Corporation
WHITE PAPER: Are you neglecting secure access to apps and endpoints? This ebook offers an approach to lower your risk of getting breached by increasing your IAM maturity through adopting a Zero Trust approach with the right IDaaS strategy.
Posted: 18 Apr 2018 | Published: 18 Apr 2018

Centrify Corporation

Securing Cloud Infrastructure and Applications with a SOC-as-a-Service
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: As cyberattacks grow more common, and bad actors increasingly exploit the cloud, IT professionals need robust cloud security strategies to protect their company. This white paper explores how the hybrid architecture of modern business increases exposure to all major types of cyberattacks.
Posted: 16 Apr 2018 | Published: 16 Apr 2018

Arctic Wolf Networks, Inc.

Advanced Networking and Security in a Cloud-Native World
sponsored by VMware
RESOURCE: In this resource, uncover how to overcome application deployment and performance challenges due to legacy networks.
Posted: 11 Apr 2018 | Published: 11 Apr 2018

VMware

Next-Generation Firewall on Microsoft Azure
sponsored by Juniper Networks
WHITE PAPER: How does your enterprise plan to augment Microsoft Azure security? Take a look at this resource to uncover an advanced next-gen firewall security strategy which offers robust networking, cloud class routing, and automated virtual machine life cycle management capabilities.
Posted: 11 Apr 2018 | Published: 11 Apr 2018

Juniper Networks

Choosing the Right Model: A Guide to DDoS Protection
sponsored by F5 Networks
WHITE PAPER: According to the Verizon DBIR, businesses of all sizes in nearly every industry run the risk of being attacked by DDoS. Leverage this guide to uncover how to choose the right model for DDoS protection.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

F5 Networks

Maximize your investment in Microsoft Office 365 with Citrix Workspace
sponsored by Citrix
WHITE PAPER: Download this white paper to see how a unified workspace management platform can help your organization make the most out of your migration to Office 365.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

Citrix

Microservices and Container Security
sponsored by Sysdig
WHITE PAPER: If you're considering a move to microservices and/or containers, you will need to rethink the security infrastructure surrounding your applications and testing processes. Use this container and microservices RFP template to help make your decision by comparing several different vendors across runtime security, incident response, and more.
Posted: 06 Apr 2018 | Published: 06 Apr 2018

Sysdig

The Hidden ROI of Cloud-Friendly Security
sponsored by F5 Networks
WHITE PAPER: According to F5 Labs Research, 53% of data breaches target the application layer. Take a look at this resource to gain insight into the ROI benefits of boosting cloud and application layer security.
Posted: 04 Apr 2018 | Published: 04 Apr 2018

F5 Networks

Microservices and Container Security
sponsored by Sysdig
WHITE PAPER: If you're considering a move to microservices and/or containers, you will need to rethink the security infrastructure surrounding your applications and testing processes. Use this container and microservices RFP template to help make your decision by comparing several different vendors across runtime security, incident response, and more.
Posted: 04 Apr 2018 | Published: 05 Apr 2018

Sysdig

Considerations for Managing and Securing Box in the Enterprise
sponsored by VMware
WHITE PAPER: Download this white paper to learn how a unified digital workspace can provide users with access to file-sharing and collaboration apps they need, while delivering the security and management tools IT requires.
Posted: 30 Mar 2018 | Published: 30 Mar 2018

VMware

Guide to Rethinking Your IT Security
sponsored by VMware
WHITE PAPER: As technology is transforming and becoming more complex, malicious attacks are as well. Take a look at this resource to uncover how to respond to the security challenges of the changing IT landscape.
Posted: 29 Mar 2018 | Published: 29 Mar 2018

VMware

Transforming Security in the Mobile Cloud Era
sponsored by VMware
WHITE PAPER: Malicious attacks have adapted and become more sophisticated, making it more difficult for organizations to prevent them. Take a look at this resource to learn how to protect your data, improve agility and stay compliant in the mobile cloud era.
Posted: 29 Mar 2018 | Published: 29 Mar 2018

VMware

The Fundamentals of a Secure Application Infrastructure
sponsored by VMware
WHITE PAPER: As people, devices, and objects become more connected, protecting these connections and environments has become more critical than ever. Explore this resource to gain insight into securing the application infrastructure and remaining protected in the age of constant communication.
Posted: 28 Mar 2018 | Published: 28 Mar 2018

VMware

How Apps Are Elevating The Performance Of Workers And Companies
sponsored by VMware
RESEARCH CONTENT: Download this research report to learn more about how business apps are impacting company performance and employee productivity.
Posted: 27 Mar 2018 | Published: 27 Mar 2018

VMware

Application-Centric Security
sponsored by VMware
WHITE PAPER: The digital economy has made users and endpoints multiply, giving cybercriminals a great deal of opportunity to carry out malicious attacks. Explore this resource to uncover a strategy that builds protection into the DNA of the digital infrastructure.
Posted: 26 Mar 2018 | Published: 26 Mar 2018

VMware

DevSecOps: Mastering security's group effort
sponsored by RSA Conference
WEBCAST: DevSecOps can be costly and time consuming, making it a challenging undertaking. Tune into this webcast to hear security experts discuss the hurdles of DevSecOps and how to foster a successful approach.
Posted: 19 Mar 2018 | Premiered: Mar 19, 2018

RSA Conference

Effectively Balancing DevSecOps
sponsored by Flux7 Labs
WHITE PAPER: As cyberattacks continue to shake the headlines, security needs to be at the forefront of every organization. This white paper explores how to achieve security with agility in the cloud as well as how to effectively balance DevSecOps.
Posted: 15 Mar 2018 | Published: 15 Mar 2018

Flux7 Labs

Open Source Security and Compliance: Trends to Act on in 2018
sponsored by Flexera Software
WEBCAST: According to a Forrester report, 45% of firms say they suffered a breach as a result of an external attack, with software vulnerabilities and web applications as the top methods of attack. This webcast reveals the shift in open source security and compliance while outlining how to remain secure and compliant in the upcoming year.
Posted: 13 Mar 2018 | Premiered: Mar 13, 2018

Flexera Software

Open Source Security in 2017: Lessons Learned for the New Year
sponsored by Flexera Software
WEBCAST: The usage of open source software has changed dramatically in the past year. Leverage this webcast to learn about the usage and awareness of open source software in 2017 and how to better prepare for software security in 2018.
Posted: 13 Mar 2018 | Premiered: Mar 13, 2018

Flexera Software

Open Source Risk – Fact or Fiction?
sponsored by Flexera Software
WHITE PAPER: Many new enterprise technologies are centered around open-source technology. This resource explores the risks involved with open-source software and how your enterprise can remain secure.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

Flexera Software

Cloud migration: Choosing the right strategy and tools
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, learn how to sell the value of cloud to the C-suite, roll DevOps tools into your migration plan, and avoid access control mistakes that could lead to data breaches that have hit the headlines of late.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

ComputerWeekly.com

Mitigating the SSL/TLS Cybersecurity Threat
sponsored by Radware
WHITE PAPER: 75% of web traffic will be encrypted by 2019, according to NSS Labs. Utilize this e-book to learn how to combat the growing number of complex encrypted web attacks as well as mitigate SSL/TLS cybersecurity threats.
Posted: 09 Mar 2018 | Published: 09 Mar 2018

Radware

What Security People Want: Making DevSecOps Happen with Containers
sponsored by Aqua Security
WEBCAST: Securing containerized apps is necessary for protecting your organization. Explore this webcast to gain insight into securing applications and making DevSecOps happen with containers.
Posted: 09 Mar 2018 | Premiered: Mar 9, 2018

Aqua Security
1 - 25 of 845 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement