IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
1 - 25 of 945 Matches Previous Page  |  Next Page
Containers at Risk: A Review of 21,000 Cloud Environments
sponsored by Lacework
WHITE PAPER: This report describes the risks and threats that can be created by deploying workload in the public cloud without proper security. Read on to learn about platforms discovered such as Kubernetes, Docker Swarm, Redhat Openshift, and more.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Lacework

2018 Application Security Research Update
sponsored by Micro Focus
RESEARCH CONTENT: Find out the state of application security in 2018 in this insightful research report from the Software Security Research team at Micro Focus Fortify.
Posted: 18 Oct 2018 | Published: 18 Oct 2018

Micro Focus

Get Started with Application Security in 3 Easy Steps
sponsored by Micro Focus
RESOURCE: With the growing demand for rapid delivery of new business applications, learn 3 steps that can help improve your organization's overall application security.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

Micro Focus

Duo: Most Loved Security Company Chooses Most Trusted Web Defense
sponsored by Signal Sciences
CASE STUDY: Learn how Duo used Signal Sciences for immediate application security visibility and blocking, without impacting their user experience.
Posted: 16 Oct 2018 | Published: 16 Oct 2018

Signal Sciences

How to Use ThreatConnect Playbooks to Manage Security APIs
sponsored by ThreatConnect
RESOURCE: Planning for APIs as a part of your security infrastructure is becoming increasingly important in today's IT environment. Why? Checkout this blog post from ThreatConnect to learn more about the benefits of API and API management.
Posted: 15 Oct 2018 | Published: 18 May 2018

ThreatConnect

Machine Learning Pushes Fortiweb to the Head of the WAF Class
sponsored by Fortinet, Inc.
WHITE PAPER: Web application firewalls (WAFs) have taken center stage in enterprise security architectures due to the complexity of the threat landscape. In this white paper, discover the key features of a WAF that meets the security and operational requirements that security organizations need.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Fortinet, Inc.

Modular Security in the Age of Automated SecOps
sponsored by Swimlane
WHITE PAPER: SecOps teams are frequently inundated with inefficient, manual tasks, which leave them with limited resources to implement incident response processes. In this e-book, learn how SecOps can use automation and orchestration to help solve these issues.
Posted: 10 Oct 2018 | Published: 10 Oct 2018

Swimlane

Say Hello to the Software-Defined Perimeter (SDP)
sponsored by Zscaler
ANALYST REPORT: ESG predicts that the challenge of using legacy methods will serve as a catalyst for a new user and application-centric approach to secure internal applications – software-defined perimeter (SDP). In this ESG report, explore the rise of software-defined perimeters and its many use cases.
Posted: 10 Oct 2018 | Published: 31 May 2018

Zscaler

4 Steps to Transforming Network Security
sponsored by VMware
RESOURCE: Can traditional perimeter protection work now that a clear perimeter no longer exists? Doubtful. Download this resource to uncover 4 Steps to transforming network security, how security can enable digital transformation and not impede it and more.
Posted: 10 Oct 2018 | Published: 31 May 2018

VMware

Advanced Networking and Security in a Cloud-Native World with VMware NSX Data Center
sponsored by VMware
WHITE PAPER: Cloud-native applications based on microservice architectures and new frameworks like containers are quickly becoming the new norm. This shift can cause issues around functions that cloud-native platforms don't always address. In this white paper, discover VMware's cloud-native networking and security platform.
Posted: 10 Oct 2018 | Published: 31 Jan 2018

VMware

Transforming Network & App Security at Man Energy Solutions
sponsored by Zscaler
CASE STUDY: In this case study, discover how a major energy provider switched from a traditional castle and moat approach to a modern cloud deployment for network security. This switch helped MAN to experience benefits, including a better experience for end users, reduced attacks surface, and more.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Zscaler

Navigating a Security Wasteland
sponsored by ThreatConnect
RESOURCE: Inside, Adam Vincent – CEO and co-founder of ThreatConnect, takes a deep dive with Kathie Miley –COO of Cybrary, to discuss how managing your enterprise security organization like a small business is pivotal when it comes to application and cloud security.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

ThreatConnect

Adopting a Zero Trust Model: Google Did It, Can You?
sponsored by Zscaler
WEBCAST: In this webinar hear from Ameet Jani, Product Manager at Google Cloud and Manoj Apte, Chief Strategy Officer at Zscaler as they talk about zero-trust security, and how to take a user and application-centric approach to application access.
Posted: 09 Oct 2018 | Premiered: Apr 27, 2018

Zscaler

Securing Containerized, Cloud-Native Applications
sponsored by StackRox
WHITE PAPER: A container security platform can maximize the inherent security advantages of containers – immutability and declarative configuration – to improve your security posture. Access this product overview to learn how you can provide the protection your containers need.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

StackRox

The StackRox Container Security Platform
sponsored by StackRox
WHITE PAPER: In this data sheet find out how a container security platform can reduce security risks to your containerized, cloud-native applications during the build, deploy, and run phases.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

StackRox

How to Choose a Next-Generation Web Application Firewall
sponsored by Fortinet, Inc.
EBOOK: In this e-book discover how to choose a web application firewall that has sophisticated behavioral threat detection, excellence in core WAF capabilities, and more.
Posted: 04 Oct 2018 | Published: 04 Oct 2018

Fortinet, Inc.

Secure Software Development in the Financial Services Industry
sponsored by GitHub
RESOURCE: Find out how financial service institutions (FSIs) can meet strict security regulations and create a culture of truly secure software development to deliver the best possible products while safeguarding customer data.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

GitHub

Delivering Safer Apps with Docker Enterprise and Windows Server
sponsored by Docker
WHITE PAPER: Many are now housing mission-critical applications in containers to accelerate the delivery of apps and reduce their possible attack surface. In this whitepaper, find the three keys to safer apps and how a migration to containers can help accomplish all of them in your organization.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

Docker

You Can't Fight Today's DoS Attacks With Yesterday's WAF
sponsored by F5 Networks
RESOURCE: Traditional WAFs have prevented numerous application attacks by applying protocol compliance and signature comparisons to filter and block potential attacks. However, these WAFs are ill-equipped to keep up with more advanced attacks. Read on to learn how you can replace your traditional WAF with an advanced WAF, today.
Posted: 26 Sep 2018 | Published: 26 Sep 2018

F5 Networks

Is Your WAF Keeping Pace With Today's Threats?
sponsored by F5 Networks
WHITE PAPER: Cyberattackers are starting to target the application layer, which if breached allows attackers to access the interfaces that hosts use to communicate and access information sent over a network. Read this white paper to learn how to choose a web app firewall (WAF) that protects your network.
Posted: 26 Sep 2018 | Published: 26 Sep 2018

F5 Networks

DDoS is the New Spam: 3 Strategies to Turn Catastrophe into Annoyance
sponsored by F5 Networks
EBOOK: DDoS isn't going away anytime soon, and as attacks and motivations evolve, so must IT security defenses. Download this e-book for 3 strategies on how to up your DDoS game, today.
Posted: 21 Sep 2018 | Published: 31 Dec 2017

F5 Networks

Fraud: It's Not Just for Banks Anymore
sponsored by F5 Networks
RESOURCE: Download this resource to learn why using a web application firewall (WAF), with full-proxy capabilities, can be your best defense mechanism against fraudsters.
Posted: 21 Sep 2018 | Published: 31 Dec 2017

F5 Networks

Advanced Application Threats Require an Advanced WAF
sponsored by F5 Networks
WHITE PAPER: New methods are needed to effectively automate the mitigation of fast-evolving threats. Read this white paper to learn about application security strategies that focus on preventing automated threats, which can help you make operational improvements, and lower operating costs.
Posted: 21 Sep 2018 | Published: 21 Sep 2018

F5 Networks

Leveraging the Benefits of Cloud Web Application Security
sponsored by Oracle Dyn
RESOURCE CENTER: This custom article examines the recent advances in web app security and explores how you can leverage cloud-based technologies to mitigate the risk to your company's critical assets.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

Oracle Dyn

Play it Safe, Secure Your Cloud Network Using These Methods
sponsored by Forcepoint
WEBCAST: Because there are no real standard practices yet, the risks presented by SaaS applications vary widely. Tune in to this webcast for the best practices to secure your cloud network.
Posted: 14 Sep 2018 | Premiered: Sep 14, 2018

Forcepoint
1 - 25 of 945 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement