IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
1 - 25 of 625 Matches Previous Page  |  Next Page
How to Automate an API Security Program
sponsored by Data Theorem
WEBCAST: Join Doug Dooley, COO at Data Theorem, as he discusses the need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data.
Posted: 10 Jun 2019 | Premiered: Jun 10, 2019

Data Theorem

Application-Centric Security
sponsored by Nutanix
EBOOK: Relying on antiquated methods of protecting IT is no longer feasible. It's time to consider a new application-centric approach that delivers the protection you need with more agility, more flexibility, and above all, better security. Download this e-book to learn how application-centric security can benefit your organization today.
Posted: 05 Jun 2019 | Published: 05 Jun 2019

Nutanix

Avoid the Breach With Effective Application Security Testing
sponsored by HackerOne
WEBCAST: Security is a top priority for e-commerce giant Shopify. Join Shopify's Vice President of Security Engineering and IT, Andrew Dunbar in this webcast as he discusses best practices for testing and securing your cloud-based web applications. The session will also cover how you can scale application security for high-growth DevOps organizations.
Posted: 04 Jun 2019 | Premiered: Jun 4, 2019

HackerOne

Meet PCI DSS Requirements
sponsored by HackerOne
WEBCAST: Many organizations are limited by traditional penetration tests. A better approach is needed to discover real-world vulnerabilities while meeting penetration testing requirements set forth by PCI-DSS. In this webcast, learn how crowdsourced security testing addresses compliance requirements, scales security teams and keeps applications safe.
Posted: 04 Jun 2019 | Premiered: Jun 4, 2019

HackerOne

DevOps Security for Cloud and Containers
sponsored by Lacework
EBOOK: In this e-book, learn how technology differences between development, staging, and product environments can lead to much larger security problems, how microservices deployed as containers help eliminate vulnerabilities, and much more.
Posted: 30 May 2019 | Published: 30 May 2019

Lacework

Deakin Hardens Its Shield With Ivanti
sponsored by Ivanti ANZ
CASE STUDY: Deakin University determined the ASD's recommended cybersecurity controls would help them implement the strongest defense against cyberattacks. In this case study, learn how Deakin University was able to address the Top 4 of the ASD Essential 8 strategies after implementing Ivanti's security portfolio.
Posted: 30 May 2019 | Published: 30 May 2019

Ivanti ANZ

A Security Guide to Container Orchestration
sponsored by Lacework
WHITE PAPER: It's hard to argue against the benefits of containers and containerized apps running on cloud resources. However, containers create new cloud security challenges. Download this Security Guide to Container Orchestration to learn how you can stay secure in your various cloud environments today.
Posted: 29 May 2019 | Published: 29 May 2019

Lacework

How to Simplify Security and Shrink the Attack Surface
sponsored by VMware and Intel
WHITE PAPER: Modern applications are dynamic and distributed – and the attack surface keeps growing as a result. To secure your business, you need security integrated into your infrastructure, not bolted-on. Download the eBook to learn how to reduce the attack surface and simplify security.
Posted: 23 May 2019 | Published: 31 Aug 2018

VMware and Intel

Making Application Security Pay
sponsored by Veracode, Inc.
WHITE PAPER: Jump into this whitepaper to learn strategies for improving the effectiveness of your application security process, from developer training, to remediation coaching, automated testing, and more.
Posted: 21 May 2019 | Published: 21 May 2019

Veracode, Inc.

Secure Coding Best Practices Handbook
sponsored by Veracode, Inc.
WHITE PAPER: Access this whitepaper to learn some of the best steps you can take today to have more secure coding practices, and the many risks you'll be able to address.
Posted: 21 May 2019 | Published: 21 May 2019

Veracode, Inc.

The Total Economic Impact Of Veracode Application Security Platform
sponsored by Veracode, Inc.
ANALYST REPORT: Check out this ROI analysis of Veracode's application security platform to find out just how much more secure your apps could be, and how you can reduce security flaw resolution time by 90%.
Posted: 21 May 2019 | Published: 31 Mar 2019

Veracode, Inc.

Application Security Beyond Scanning
sponsored by Veracode, Inc.
WHITE PAPER: To make application security truly effective at reducing the risk of a damaging breach, there are three critical steps beyond scanning to help develop more secure code. Explore those three critical steps in this whitepaper.
Posted: 20 May 2019 | Published: 20 May 2019

Veracode, Inc.

Secure DevOps: Fact or Fiction?
sponsored by Veracode, Inc.
ANALYST BRIEF: It's important to build security into your DevOps process. This is easier said than done, but take a look through this DevOps security guide to uncover how to shift security left, who should be responsible for security, and how to quickly improve the quality of the applications you are developing.
Posted: 20 May 2019 | Published: 31 Oct 2018

Veracode, Inc.

Blue Prism Transforms Security from Reactive to Proactive with Veracode
sponsored by Veracode, Inc.
CASE STUDY: Establishing trust in your product's security is just as important as its overall quality in the eye of the user -- a fact almost all developers are familiar with. That's why many development teams are making a shift from reactive to proactive application security models. Keep reading to find out why, illustrated by a real world story.
Posted: 20 May 2019 | Published: 20 May 2019

Veracode, Inc.

The State of the CASB Market
sponsored by Forcepoint
WEBCAST: With CASBs (Cloud Access Security Brokers), organizations can experience the benefits of innovation that cloud applications bring while maintaining control of their data. In this webcast, CEO and Osterman Research founder Mike Osterman will share the results of his survey on how organizations are using, or planning to implement, CASBs.
Posted: 15 May 2019 | Premiered: May 15, 2019

Forcepoint

Security Automation with Ansible
sponsored by Red Hat
WEBCAST: Configuring systems and applications to make life more difficult for attackers is daunting. In this webcast, learn how using the agentless, push-based power of Red Hat Ansible Automation to apply and enforce security standards can help organizations adapt to meet internal and external security guidelines.
Posted: 15 May 2019 | Premiered: May 15, 2019

Red Hat

Definitive Guide to Securing DevOps
sponsored by WhiteHat Security
WHITE PAPER: Security can become a massive roadblock at the end of a development sprint, so you need to think about shifting it left in your DevOps process. What can a security shift left accomplish for you? Learn about all of the benefits in this whitepaper, and learn how to begin moving your security process today.
Posted: 14 May 2019 | Published: 14 May 2019

WhiteHat Security

Protecting Against Threats with Updated Application Security Testing
sponsored by WhiteHat Security
ANALYST REPORT: In this Technology Spotlight report, IDC recommends application security testing tools that integrate security throughout the entire software development life cycle. Read on for an in-depth look at the role of WhiteHat Security in the marketplace for application security testing solutions.
Posted: 14 May 2019 | Published: 14 May 2019

WhiteHat Security

A Guide to Achieving SaaS Security and Compliance
sponsored by Forcepoint
WHITE PAPER: The nature of today's organizations is being driven by employees' demands for greater flexibility, productivity, and mobility. While SaaS applications fulfill these user demands, they also pose visibility and control challenges for IT. In this white paper, learn how SaaS applications can be effective at meeting users' needs without posing risks.
Posted: 14 May 2019 | Published: 14 May 2019

Forcepoint

Cloud Access Security Broker- Market Quadrant 2018
sponsored by Forcepoint
RESEARCH CONTENT: Cloud Access Security Brokers (CASBs) serve to monitor activity and enforce security policies between cloud users and cloud applications. CASBs also give organizations visibility into authorized and non-authorized cloud applications. In this Radicati Market Quadrant, explore key CASB vendors in the market.
Posted: 14 May 2019 | Published: 31 Oct 2018

Forcepoint

How to Navigate the Intersection of DevOps and Security
sponsored by Synopsys
WHITE PAPER: Open this whitepaper on navigating the intersection of DevOps and security to learn how to include security early on in your development process and keep your deployment schedule moving smoothly.
Posted: 14 May 2019 | Published: 31 Jul 2018

Synopsys

Magic Quadrant for Application Security Testing
sponsored by Synopsys
ANALYST REPORT: In this Gartner Magic Quadrant report, discover 11 AST vendors and how they stack up. Some of these vendors include, Synopsys, Veracode, IBM, WhiteHat Security, and more. Read on to see how these vendors stack up.
Posted: 13 May 2019 | Published: 13 May 2019

Synopsys

The CISO's Ultimate Guide to Securing Applications
sponsored by Synopsys
WHITE PAPER: In The CISO's Ultimate Guide to Securing Applications, discover the tools and services you need to get your application security program on track.
Posted: 13 May 2019 | Published: 13 May 2019

Synopsys

Agile Development for Application Security Managers
sponsored by Synopsys
WHITE PAPER: Security is an incredibly important, though oftentimes forgotten piece of any Agile process. In this guide, find what tweaks to your Agile process you can make today to improve security and deploy your applications even faster.
Posted: 13 May 2019 | Published: 31 Dec 2017

Synopsys

Top 10 Application Security Vulnerabilities for Developers
sponsored by WhiteHat Security
VIDEO: Join Mark Rogan, DAST Manager from the WhiteHat Security Threat Research Center, as he discusses the top vulnerabilities and gives valuable prevention tips for enterprises to implement.
Posted: 13 May 2019 | Premiered: 13 May 2019

WhiteHat Security
1 - 25 of 625 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement