IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
1 - 25 of 950 Matches Previous Page  |  Next Page
2018 Application Security Statistics Report
sponsored by WhiteHat Security
WHITE PAPER: This application security statistics report provides an analysis of the state of application security, brings to the forefront evolutionary trends, and highlights best practices that result in better application security over time. The report also presents challenges and opportunities to secure the applications.
Posted: 07 Dec 2018 | Published: 31 Dec 2018

WhiteHat Security

Application Modernization Survey
sponsored by Red Hat
RESEARCH CONTENT: Application modernization is a huge topic in almost every company at the moment. We would like to learn a little more about your company’s potential plans to modernize/migrate your applications - can you spare three minutes?
Posted: 06 Dec 2018 | Published: 06 Dec 2018

Red Hat

Digital Transformation and the Application Challenge
sponsored by F5 Networks
WHITE PAPER: Discover 5 keys to keeping up with the pace of Agile and DevOps app development and overcoming digital transformation challenges so that you can deliver apps that are secure, high performing, and highly available.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

The New NetOps: Securing App Delivery
sponsored by F5 Networks
WHITE PAPER: This white paper explores how transform your app delivery strategy to keep pace with the shift from waterfall to Agile, DevOps, and continuous integration/delivery methodologies. Find out how to update your ADC and learn about the BIG-IP Cloud edition, designed to help you build your NetOps program and enable secure app delivery.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

Financial Services: Managing Digital Risk and Compliance
sponsored by Proofpoint, Inc.
WHITE PAPER: Open this white paper to uncover the best approaches financial institutions can take to protect against domain risks, mobile app risks, digital compliance and much more.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

Proofpoint, Inc.

Securing Every App isn't a Pipe Dream
sponsored by F5 Networks
WHITE PAPER: This white paper takes a look at how network operations and security are changing to keep modern apps protected. Learn about the BIG-IP Cloud Edition and find out what make-or-break factors to look for in the tools in you app delivery pipeline so you can ensure sound app security, availability, and performance.
Posted: 03 Dec 2018 | Published: 03 Dec 2018

F5 Networks

Using APIs to Build Your Omnichannel Architecture
sponsored by MuleSoft
CASE STUDY: Tune into this webcast to find out how one company was able to overcome integration challenges associated with an acquisition through the use of APIs and an omnichannel architecture.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

MuleSoft

10 Steps to Lead You Through the System Integration Maze
sponsored by Magic Software Enterprises
WHITE PAPER: In this white paper discover 10 steps to help your organization navigate the system integration maze through systematic business process integration platforms that speed project completion, simplify integration, reduce risk and more.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

Magic Software Enterprises

Leading Banks Eye APIs to Leapfrog the Competition
sponsored by MuleSoft
WHITE PAPER: Application Programming Interfaces (APIs) have emerged as essential tools and critical enablers to help businesses meet new consumer expectations and add new functionality. Read this white paper to learn more about the role of APIs and how this new ecosystem will help organizations create new revenue streams.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

MuleSoft

Security by Design: DevOps in the Era of the GDPR
sponsored by Trend Micro
RESOURCE: Check out this infographic to see how DevOps teams are affected by the GDPR, how secure DevOps can help with GDPR compliance, and more.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

Trend Micro

Computer Weekly – 27 November 2018: Software patching at scale – how to make it work
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

ComputerWeekly.com

What's Next in Digital Workspaces: 3 Improvements to Look for in 2019
sponsored by Citrix
RESOURCE: Download this article to uncover three new capabilities or features that will make digital workspaces even more compelling and less complex to deploy and manage in the coming year.
Posted: 20 Nov 2018 | Published: 20 Nov 2018

Citrix

The State of Application Security in Today's Application Economy
sponsored by Micro Focus
WHITE PAPER: As companies become active players in the application economy, the implications of security—and the lack thereof—loom over them. Organizations that have never before given thought to security are now concerned about the risk posed by their applications. In this IDG quick poll, uncover considerations for building your application security strategy.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Micro Focus

Deliver Secure Software at the Speed of DevOps
sponsored by Checkmarx
WHITE PAPER: Download this white paper to learn how you can bake security into your development process from the start, easing the work for developers and eliminating the need to fight threats after the fact.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Checkmarx

The Complete Guide to Developer Secure Coding Education
sponsored by Checkmarx
WHITE PAPER: Download this guide for tips on how to best educate your development teams on AppSec best practices.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Checkmarx

Top Five Kubernetes RBAC Mistakes to Avoid
sponsored by StackRox
WHITE PAPER: The Role-Based Access Control (RBAC) security feature for Kubernetes is able to protect your cluster by allowing you to control who can access specific API resources. Read this whitepaper to learn the top five configuration mistakes to avoid for RBAC, and how to remedy any already existing in your Kubernetes environment.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

StackRox

An API Gateway: The Secret to Preventing Under Protected APIs
sponsored by Software AG Government Solutions
WHITE PAPER: Explore 7 key best practices to consider when designing a secure architecture needed to implement a secure API gateway.
Posted: 08 Nov 2018 | Published: 08 Nov 2018

Software AG Government Solutions

Email+ Enhances PIM Security and Preserves the Native App Experience
sponsored by MobileIron
RESOURCE: Personal information management (PIM) apps are some of the most commonly used apps in the enterprise. But, how can you enhance the security of PIM apps without degrading the native app experience? Download this resource to find out.
Posted: 05 Nov 2018 | Published: 05 Nov 2018

MobileIron

Advanced Security for Mobile Apps and Data
sponsored by MobileIron
WHITE PAPER: Download this white paper to learn how a mobile security platform with mobile app lifecycle management and a secure multi-OS app VPN can help your organization's IT team manage mobile data and apps more effectively.
Posted: 02 Nov 2018 | Published: 02 Nov 2018

MobileIron

Build a Strategic Approach to Network and App Security
sponsored by Citrix
RESOURCE: Learn how your organization can securely deliver the apps and data your teams need to be productive.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

Citrix

Detecting and Preventing Banking Application Fraud
sponsored by SAS
RESOURCE: Preventing application fraud starts with validating the identity of an individual using a digital device. Are they really who they say they are? Download this white paper for analytics-driven methods for validating financial services applications and spotting trouble at all three stages of bust-out fraud schemes.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

SAS

Application Security and Performance
sponsored by IBM Akamai
WHITE PAPER: Web application and distributed denial of service (DDoS) attacks hit enterprises without warning or reason. Download this resource to discover how to protect against DDoS attacks and prevent operational disruption, loss of confidential data, lost user productivity, reputational harm, and more.
Posted: 26 Oct 2018 | Published: 26 Oct 2018

IBM Akamai

6 Ways a CASB Makes Cloud Apps Safe for Business
sponsored by Symantec
RESOURCE: Learn how a Cloud Access Security Broker (CASB) can enable you to control cloud chaos across all your apps and data.
Posted: 25 Oct 2018 | Published: 25 Oct 2018

Symantec

Putting the "Security" in Secure Remote Access
sponsored by Citrix
WHITE PAPER: Learn how Citrix NetScaler Unified Gateway can deliver comprehensive secure remote access for your application environment.
Posted: 23 Oct 2018 | Published: 23 Oct 2018

Citrix

How to Simplify Security and Shrink the Attack Surface
sponsored by VMware
WHITE PAPER: Modern applications are dynamic and distributed – and the attack surface keeps growing as a result. To secure your business, you need security integrated into your infrastructure, not bolted-on. Download the e-book to learn how to reduce the attack surface and simplify security.
Posted: 29 Oct 2018 | Published: 31 Aug 2018

VMware
1 - 25 of 950 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement