IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
1 - 25 of 885 Matches Previous Page  |  Next Page
How to Build an Effective API Security Strategy
sponsored by Imperva
ANALYST REPORT: By 2022, API abuses will be the most-frequent attack vector resulting in data breaches for enterprise web applications. In this Gartner report, explore the importance of key API stakeholders and the 3-step approach to continuous API security.
Posted: 15 Aug 2018 | Published: 08 Dec 2017

Imperva

Digitize Enterprise Assets for Mobility - Enable High Productivity for Professional Developers
sponsored by Progress Software, Inc.
WEBCAST: How can organizations meet the customer demands for digital experiences on enterprise systems such as ERP systems or enterprise APIs? Tune in to explore four options to digitize enterprise systems to deliver experiences for the connected world.
Posted: 15 Aug 2018 | Premiered: Jun 11, 2018

Progress Software, Inc.

Controlling the Uncontrollable End User
sponsored by Citrix
RESOURCE CENTER: Read this article to learn how secure digital workspaces can provide platforms that position your organization to give users the experience and options they demand, while providing unified security and management functionality for IT.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

Citrix

A New Security Strategy that Protects the Organization When Work Is Happening from Anywhere
sponsored by Citrix
RESOURCE CENTER: Discover a new approach to cybersecurity that protects the organization when work is happening anywhere on any mobile device.
Posted: 13 Aug 2018 | Published: 13 Aug 2018

Citrix

Guide to Modernizing Traditional Security: The Advantages of Moving a Legacy Application to Containers
sponsored by Twistlock, Inc.
RESOURCE: The trend of "lift and shift" has started to take off with moving applications to containerized environments. Read on to find out the advantages of taking a containerized approach with compliance, vulnerability management, and runtime defense.
Posted: 09 Aug 2018 | Published: 09 Aug 2018


Executing on NIST SP 800-190
sponsored by Twistlock, Inc.
WHITE PAPER: When apps scale out, the old method of manually creating and maintaining security rules becomes impractical. Together The National Institutue of Standards and Technology (NIST) and Twistlock secure container environments at scale and enforce policies to secure container workloads across the environment.
Posted: 08 Aug 2018 | Published: 08 Aug 2018


Reducing Cyber Exposure from Cloud to Containers: 5 Key Learnings from the CISO POV
sponsored by Tenable
RESOURCE: To combat the issue of cyber risk, a discipline called cyber exposure is emerging to help organizations manage and measure their risk. In this e-book, uncover insights from CISOs on how they are addressing the modern attack surface, including 5 key takeaways on their cyber exposure journey.
Posted: 08 Aug 2018 | Published: 08 Aug 2018

Tenable

Guide to HIPAA Compliance for Containers
sponsored by Twistlock, Inc.
WHITE PAPER: Explore this resource as it will guide you through the ways you can achieve compliance with the HIPAA Security Rule for containerized workloads.
Posted: 08 Aug 2018 | Published: 08 Aug 2018


Guide to the Proactive Security Paradigm: How Containers Can Revamp Your Approach to Security
sponsored by Twistlock, Inc.
WHITE PAPER: Discover how microservices and containers empower organizations to define a new, proactive security paradigm, and keep applications and the environments in which they live more secure than ever.
Posted: 07 Aug 2018 | Published: 07 Aug 2018


Strategies for Securing Highly Scalable Containerized Environments
sponsored by Twistlock, Inc.
WHITE PAPER: In this white paper, find out how your organization can take a new approach to security in a containerized environment.
Posted: 07 Aug 2018 | Published: 07 Aug 2018


Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

Veracode, Inc.

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

Veracode, Inc.

Application security: More important than ever
sponsored by IBM
EGUIDE: In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

IBM

Everything You Need to Know About Getting Application Security Buy-in
sponsored by Veracode, Inc.
WHITE PAPER: Application security impacts multiple groups across the entire organization. Read this paper to learn everything you need to know about getting these groups to buy-in on application security.
Posted: 02 Aug 2018 | Published: 02 Feb 2018

Veracode, Inc.

Software Today: What Applications Now Look Like
sponsored by Veracode, Inc.
WHITE PAPER: Download this infographic to see how modern applications are different today, and learn where you can take steps to prevent security risks throughout the development process.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

Veracode, Inc.

The Hotel Hijackers
sponsored by Panda Security
WHITE PAPER: Between booking rooms in person and online and making electronic payments at shops and restaurants, the hacking possibilities at hotels are endless. Tap into this report to learn about how 8 different hotels handled cyber-attacks, and how you can use cybersecurity services to avoid an attack.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

Panda Security

IBM Security Access Manager: Tolly Test Report
sponsored by IBM
WHITE PAPER: Find out how your organization could benefit from a Security Access Management tool that ensures security within your web applications, while receiving flexible risk-based access, strong authentication capabilities, and more.
Posted: 01 Aug 2018 | Published: 30 Jun 2016

IBM

10 Reasons Enterprises are Moving Security to the Cloud
sponsored by Zscaler
WHITE PAPER: Organizations have already recognized the value in moving apps to the cloud – now they're looking to migrate their security as well. Learn about the Zscaler Security Cloud and discover 10 reasons enterprises have started moving security to the cloud.
Posted: 01 Aug 2018 | Published: 31 Dec 2017

Zscaler

How We Build Risk Into Applications
sponsored by Veracode, Inc.
RESOURCE: There are a number of ways you could be building risks into your applications from design to production. Download this infographic to find out how to avoid building risks into your apps in 3 steps.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

Veracode, Inc.

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
Posted: 01 Aug 2018 | Published: 02 Feb 2018

Veracode, Inc.

How the University of New Hampshire Protects Users, Data, and Environments
sponsored by VMware
CASE STUDY: Find out how the University of New Hampshire was able to solve its complicated security challenges for a faster, more secure, and cost-effective solution.
Posted: 30 Jul 2018 | Published: 31 Dec 2017

VMware

Getting Started with Vulnerability Mitigation
sponsored by Kaseya
RESOURCE: Find out which applications are most vulnerable to your enterprise and modernize your software and vulnerability management strategy today.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

Kaseya

Top Trends Shaping IAM In 2018 Landscape: The Identity And Access Management Playbook
sponsored by OneLogin
ANALYST REPORT: In this Forrester report, explore several trends that will have an impact of IAM budgets, skills, priorities, architectural decisions, the vendor landscape, and deployment options.
Posted: 26 Jul 2018 | Published: 09 Jan 2018

OneLogin

Secure On- and Off- Premises IT Service Delivery Platforms
sponsored by Hewlett Packard Enterprise
EBOOK: Learn how to protect your most organizationally critical digital assets and their interactions, regardless of location or device. Download this eBook so you can adhere to these security checklists.
Posted: 16 Jul 2018 | Published: 31 Oct 2017

Hewlett Packard Enterprise

McAfee Skyhigh Security Cloud for Box
sponsored by McAfee, Inc.
RESEARCH CONTENT: Protect your corporate data and ensure security within your organization by gaining control over data and user activity in Box.
Posted: 05 Jul 2018 | Published: 30 Apr 2018

McAfee, Inc.
1 - 25 of 885 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement