IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
1 - 25 of 868 Matches Previous Page  |  Next Page
8 Steps to Zero Trust
sponsored by Akamai Technologies
RESOURCE: Use this step-by-step guide from Akamai's CTO, Charlie Gero, to build an inclusive & concrete zero trust architecture, to help enable safe application access in a cloud-native world. Easily transition to a perimeter-less environment with this prescriptive process, phasing applications in one at a time & reducing your migration risk profile.
Posted: 22 Jun 2018 | Published: 31 May 2018

Akamai Technologies

The Definitive Guide to Selecting the Right ADC for the Digital Transformation Era
sponsored by Citrix
EBOOK: In this e-book, find out how to select a modern ADC for digital transformation, designed to span physical, virtual, and containerized form factors in an increasingly cloud-first development world.
Posted: 22 Jun 2018 | Published: 22 Jun 2018

Citrix

Moving Beyond Perimeter Security: A Comprehensive and Achievable Guide to Less Risk
sponsored by Akamai Technologies
WHITE PAPER: A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper to learn how to transition to a perimeter-less world in an incredibly easy way.
Posted: 21 Jun 2018 | Published: 30 Mar 2018

Akamai Technologies

Europol and Security Leaders Declare War on Ransomware
sponsored by Barracuda
CASE STUDY: Spearheaded by Europol's European Cybercrime Center, among others, No More Ransom provides an online source of information about the latest ransomware variants, including decryption keys that have worked to retrieve files encrypted in previous attacks.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

Barracuda

Best Practices: Protect Your Apps from Cyberattckcs
sponsored by F5 Networks
WHITE PAPER: The skyrocketing popularity of websites and web-based applications has come with a corresponding explosion in the numbers, types, magnitudes, and costs of attacks that specifically target app vulnerabilities. Continue reading to reveal who is behind the security breaches, and what you can do to protect your apps.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

F5 Networks

Automating Security Best Practices on AWS
sponsored by Barracuda
RESOURCE: How can you guarantee the security of your applications? Take a glimpse at the resource to learn how incorporating application security directly into the code building process accelerates your development of web applications with confidence.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

Barracuda

Cybercrime by the Numbers
sponsored by Akamai Technologies
RESOURCE: It's likely not a matter of if, but when your company will fall prey to a targeted attack involving malware, ransomware, data exfiltration, or phishing. In fact, 70% of organizations reported a security incident that negatively impacted their business in the past year. Learn more about the realities of cybercrime in today's hyperconnected world.
Posted: 20 Jun 2018 | Published: 20 Jun 2018

Akamai Technologies

Accelerating Secure Application Delivery: CI/CD Toolchain Insertion and F5 BIG-IP LTM with Autoscale on Microsoft Azure
sponsored by F5 Networks
WHITE PAPER: An enterprise application is only ever as good as the sum of the parts used to create it. Read this whitepaper to learn about a CI/CD toolchain insertion solution that will ramp up your DevOps process for fast and safer application management.
Posted: 19 Jun 2018 | Published: 19 Jun 2018

F5 Networks

The 2018 Duo Trusted Access Report
sponsored by Duo Security
RESEARCH CONTENT: Take a look at this 13-page 2018 Duo Trusted Access Report to learn about the evolution of enterprise security and overall device health.
Posted: 19 Jun 2018 | Published: 19 Jun 2018

Duo Security

Why Moats and Castles Belong in the Past
sponsored by Akamai Technologies
WHITE PAPER: The moat-and-castle approach to enterprise security no longer works. Once inside the walls, a person can pretty much do whatever they want. Discover a new way that is more simple, secure, and convenient way to protect the enterprise.
Posted: 18 Jun 2018 | Published: 31 May 2017

Akamai Technologies

DevOps: Latest developments & use cases in ASEAN
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read more about the state of DevOps adoption across Southeast Asia, the importance of integrating security into DevOps processes and our top tips for securing management buy-in.
Posted: 18 Jun 2018 | Published: 18 Jun 2018

ComputerWeekly.com

Protecting Microservices and APIs with ABAC, OAuth and OpenID Connect
sponsored by Axiomatics
WHITE PAPER: This resource outlines a set of examples where security standards work together in addressing requirements that are difficult or impossible to meet by using OAuth or OIDC alone. Find out how your organization can combine security capabilities to separate privacy concerns and more.
Posted: 17 Jun 2018 | Published: 15 Jun 2018

Axiomatics

When Making a Build vs. Buy Decision About IAM and Dynamic Authorization, Remember DIY's Hidden Costs
sponsored by Axiomatics
RESOURCE: If you're looking for IAM and dynamic authorization for your applications, it's not always clear whether you should build a solution in-house, or purchase from an outside vendor. In this resource take a look at the hidden costs of DIY to help decide which option is best for your organization.
Posted: 13 Jun 2018 | Published: 13 Jun 2018

Axiomatics

The Key to API Security
sponsored by Axiomatics
WHITE PAPER: The management and enforcement of authentication and authorization is critical to securing APIs, and Attributed Based Access Control (ABAC) can do just that. Download this resource to learn about the features of ABAC, and how it can benefit your organization.
Posted: 13 Jun 2018 | Published: 13 Jun 2018

Axiomatics

Build vs Buy: Dynamic Authorization Solutions
sponsored by Axiomatics
WHITE PAPER: Download this review, for an assessment of the technological, price point, time-to-market, and ongoing maintenance and enhancement advantages of utilizing a dedicated security partner versus attempting to replicate a secure, scalable, and comprehensive solution in-house.
Posted: 12 Jun 2018 | Published: 12 Jun 2018

Axiomatics

Application security: More important than ever
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 11 Jun 2018 | Published: 11 Jun 2018

ComputerWeekly.com

Dark Bot Survival Guide: Strategies for Understanding the evolving Web Security Threat Landscape
sponsored by Oracle Dyn
WHITE PAPER: Bot technology is becoming increasingly sophisticated and bot traffic right now makes up more than 50% of all Internet traffic – more than human. Access this survival guide to gain strategies for better understanding the evolving web security threat landscape.
Posted: 07 Jun 2018 | Published: 07 Jun 2018

Oracle Dyn

Application Logging Challenges
sponsored by ReliaQuest
WHITE PAPER: Tap into this white paper for information on some of the common application challenges, such as custom apps and third-party hosts, and receive some tips on how to overcome them.
Posted: 07 Jun 2018 | Published: 07 Jun 2018


Blockchain for dummies
sponsored by IBM
EBOOK: Download this comprehensive 51-page guide for everything you need to know about blockchain and the benefits it stands to offer.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

IBM

6 Core Principles for Establishing DevOps Security at Scale
sponsored by CyberArk Software, Inc
EBOOK: New DevOps environments require new, high-speed security models and methodologies. In this e-book, explore 6 guiding principles for enabling DevOps security at-scale.
Posted: 06 Jun 2018 | Published: 06 Jun 2018

CyberArk Software, Inc

Securing Web Applications Building a Strategy for Defense Against Malicious Bots
sponsored by Oracle Dyn
WHITE PAPER: Attacks on web applications can circumvent your security and harm your business in myriad ways by creating unwanted downtime, reducing availability and responsiveness, and shattering trust with your customers when data confidentiality and integrity is compromised.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Oracle Dyn

Application Security as a Competitive Advantage
sponsored by Veracode, Inc.
WEBCAST: Application security a critical priority today. Learn how to address application security concerns while also gaining a competitive advantage at the same time in this video.
Posted: 05 Jun 2018 | Premiered: Jun 5, 2018

Veracode, Inc.

Analyzing the OWASP Top 10: Top Application Security Threats & How to Mitigate Them
sponsored by Radware
WHITE PAPER: Inside, explore an overview of changes between the 2013 and 2017 top 10 list, serving as an industry benchmark for the application security community. Uncover technical capabilities security pros should consider when evaluating web application firewalls.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Radware

Manage Application Security Risks and Shortcomings
sponsored by TechTarget
RESOURCE: In our just-launched guide, Manage Application Security Risks and Shortcomings, experts Kevin Beaver, Judith Myerson, Eric Johnson, and Frank Kim will explain how to find and fix the big application security risks in your organization. Offer your application security expertise in our survey to download a PDF copy of this 22-page resource.
Posted: 04 Jun 2018 | Published: 04 Jun 2018

TechTarget

Intelligent Web Application Security
sponsored by Oracle Dyn
WHITE PAPER: Access this 11-page white paper to discover the tools and techniques you can use to execute an intelligent approach to web application security.
Posted: 04 Jun 2018 | Published: 04 Jun 2018

Oracle Dyn
1 - 25 of 868 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement