IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
1 - 25 of 564 Matches Previous Page  |  Next Page
Infographic: 5 cybersecurity predictions for 2022
sponsored by ComputerWeekly.com
INFOGRAPHIC: Cybercrime showed no sign of slowing down in 2021 and enterprises continue to fall victim to cyberattacks, with gangs targeting larger organizations with increasingly large demands. In good news, we can always take stock of the recent past and know what to prepare for. In this infographic, we point out five forecasts for cybersecurity in 2022.
Posted: 06 Jan 2022 | Published: 06 Jan 2022

ComputerWeekly.com

Everything You Need to Know About the Log4j Vulnerability
sponsored by TechTarget
EGUIDE: Here, dig into the origins of the Log4J vulnerability, the severity, and what needs to change to ensure enterprise systems aren't at risk in the future.
Posted: 17 Dec 2021 | Published: 17 Dec 2021

TechTarget

Effective application security requires holistic, quick, and continuous protection
sponsored by Cloudflare Synopsis
WHITE PAPER: Although critical to most modern businesses, applications expose organizations to significant security threats. In fact, the National Vulnerability Database reported over 18,000 application vulnerabilities in 2020 – a new record. Download this white paper to learn more about protection your applications against today’s threat landscape.
Posted: 19 Nov 2021 | Published: 19 Nov 2021

Cloudflare Synopsis

Sicheres Byod Für Office 365-nutzer Mit Lookout
sponsored by Lookout
DATA SHEET: Ständig vernetzte Privatmobilgeräte werden immer häufiger für Berufliches eingesetzt und Unternehmen müssen infolgedessen Strategien für mobile Sicherheit verfolgen.Lesen Sie in diesem Datenblatt, wie BYOD-Nutzer mit Lookout Continuous Conditional Access für mit Microsoft Intune geschützte Apps auch ohne Geräteverwaltung abgesichert sind.
Posted: 02 Nov 2021 | Published: 02 Nov 2021

Lookout

Webinar: Connect FinTech to Core Banking Data
sponsored by AWS & Trustgrid
VIDEO: Cloud-based applications have become the standard for new FinTech architectures. However, this presents some unique challenges for data access, security, and integration. This webinar discusses how FinTech applications providers are reimagining the way they access and secure core banking data with data mesh – watch now to get started.
Posted: 27 Jul 2021 | Premiered: 04 Mar 2020

AWS & Trustgrid

3 ways a bug bounty platform delivers agile transformation
sponsored by YesWeHack
WHITE PAPER: In the digital age, manual penetration testing (pen-testing) is no longer a viable option for addressing application vulnerabilities. Instead, leaders are turning to bug bounty platforms, which provide crowdsourced pen-testing-as-a-service. Read this white paper to learn more about bug bounty platforms.
Posted: 08 Jun 2021 | Published: 08 Jun 2021

YesWeHack

The Consequences of Poor Authentication and Authorization Practices in APIs
sponsored by Traceable
RESOURCE: In this article, uncover examples of real-world API vulnerabilities (Shopify and Facebook) to understand how attackers could breach your defenses. And uncover what to look for when designing and building your authentication (authN) and authorization (authZ) system.
Posted: 11 May 2021 | Published: 11 May 2021

Traceable

State Of Software Security
sponsored by Veracode, Inc.
ANALYST REPORT: Developers are under constant pressure to meet deadlines to deploy effective applications. It goes without saying – this is bound to cause a few problems. Access this report to understand the current state of software security. Learn about the most recurrent application flaws, open source flaws and what can be done to ‘fix’ software security.
Posted: 27 Apr 2021 | Published: 31 Dec 2020

Veracode, Inc.

Veracode Security Labs
sponsored by Veracode, Inc.
WHITE PAPER: Software developers are the only ones who can fix vulnerabilities in their code. Yet they aren’t often trained to identify or remediate vulnerabilities – or code securely, for that matter. Now, Veracode might have what you need. Download this white paper to discover a plethora of security trainings on today’s most relevant AppSec topics.
Posted: 27 Apr 2021 | Published: 31 Mar 2021

Veracode, Inc.

The Prosimo SLA Value
sponsored by Prosimo
WHITE PAPER: One of today’s critical business functions is delivering a fast, reliable and secure application experience, but enterprise cloud architects and operations teams have limited observability and control across hybrid and multi-cloud environments. View this white paper to learn how per-application SLAs can mitigate this issue.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

Prosimo

Two Fortune 500 Financial Institutions
sponsored by Prosimo
CASE STUDY: Two large Fortune 500 financial institutions in the US and UK had local branches connected using VPLS/MPLS trunks links. With staff working remotely, they looked for alternative options to reduce the cost of transport and reliably deliver low-latency secure access. View this case study to learn how Prosimo was able to help.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

Prosimo

Leading U.S. Car Manufacturer
sponsored by Prosimo
CASE STUDY: A leading U.S. car manufacturer was managing multiple VPN solutions in various locations to connect to a specific European-hosted application for users across 3 continents, leading to disconnections and poor performance abound. View this case study to learn how Prosimo helped this manufacturer improve experience for its distributed workforce.
Posted: 14 Apr 2021 | Published: 14 Apr 2021

Prosimo

Securing the Cloud Crowdcast
sponsored by CrowdStrike
WEBCAST: Gartner says that by 2025, more than 85% of global organizations will be running containerized applications. Watch this webinar featuring CrowdStrike CTO Michael Sentonas as he discusses securing cloud workloads with DevSecOps practices and methodologies.
Posted: 06 Apr 2021 | Premiered: Apr 6, 2021

CrowdStrike

Protecting On-Premises Microsoft Exchange Servers
sponsored by TransientX, Inc
WHITE PAPER: On March 3, 2021 the US Government issued a directive to mitigate vulnerabilities with on-premises Microsoft Exchange servers due to a hack by a state-sponsored group Microsoft calls Hafnium. This day taught the lesson that VPN alone would not protect servers and data. Open this white paper to learn why zero trust can.
Posted: 02 Apr 2021 | Published: 02 Apr 2021


Evaluating and Selecting AppSec Vendors to Fit Your Business Needs
sponsored by Veracode, Inc.
RESOURCE: The application security (AppSec) market is oversaturated with an abundance of options, which can make finding an AppSec vendor/offering best fit for your unique needs a difficult task. Read this infosheet for some expert guidance to help get you started on your AppSec journey.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

Veracode, Inc.

SAST vs. DAST: What Are the Differencesand Why Are They Both Important?
sponsored by Veracode, Inc.
RESOURCE: If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Veracode, Inc.

AppSec Stats Flash Podcast: Applying the 80/20 Rule for Web, API and mobile AppSec
sponsored by WhiteHat Security
WEBCAST: The application threat landscape is rapidly evolving – this means a more frequent analysis of application security policies. What steps can be taken to make apps more secure? Watch this webcast featuring a panel of industry experts as they provide key data points and trends and discuss what can be done to improve application security.
Posted: 19 Mar 2021 | Premiered: Feb 18, 2021

WhiteHat Security

Understanding Your Open Source Risk
sponsored by Veracode, Inc.
EBOOK: Developers are being asked to push out more software — and in shorter periods of time — than ever before. This has led to an increased reliance on open source libraries, and as this code is reused, it comes with a high risk of vulnerability. Access this e-book to learn more about the risks of open source and the challenges in securing it.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Veracode, Inc.

Get the Most Mileage Out of Your AppSec Program
sponsored by WhiteHat Security
WEBCAST: While formulating your race strategy to stay secure in 2021 and beyond, your security and development teams must be running at optimal performance to ensure vulnerabilities are identified and remediated. Join this webinar to learn how you can take your application risk management to the next level.
Posted: 17 Mar 2021 | Premiered: Mar 17, 2021

WhiteHat Security

Tips to Follow onYour AppSec Journey
sponsored by Veracode, Inc.
RESOURCE: Best practices don’t become best practices overnight. There are first steps to take for each, not least in application security. So for processes such as testing, shifting left and vulnerability management, how can you start? Access this infographic to learn 5 AppSec best practices and 5 practical first steps to each.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

Veracode, Inc.

Internal Firewalls
sponsored by VMware
EBOOK: Although some operating systems are more secure than others, most used today were not designed for security from the ground up, leaving many holes in IT infrastructure as a result. Security teams need to think about compartmentalizing their network to limit damage from intrusions. Leverage this e-book to see how internal firewalls can help.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

VMware

3 Threat Vectors Addressed By Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

Protecting Against The Hidden Threats Of New Technologies
sponsored by Traceable
RESOURCE: Software development is being revolutionized by tools like GraphQL, but these new technologies also bring unknown security risks with them. Read this Traceable post to learn some of the biggest challenges facing modern application security, the shortcomings of legacy security, and strategies and solutions tackling this new wave of problems.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable

Security Observability: Why Tracing?
sponsored by Traceable
WHITE PAPER: Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable

Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.
Posted: 19 Jul 2021 | Published: 20 Jul 2021

ComputerWeekly.com
1 - 25 of 564 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences