IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
1 - 25 of 655 Matches Previous Page  |  Next Page
Interview with Fraud Strategy Leader
sponsored by Mitek Systems, Inc.
WHITE PAPER: In this Q and A, the fraud strategy leader at a mobile-only banking app sits down with the customer success leader at Mitek to talk about why customer experience is critical to business success and the vital role it plays in identity verification.
Posted: 21 Jan 2020 | Published: 21 Jan 2020


How to Safeguard Against Cross-Site Scripting (XSS) Attacks
sponsored by Tala Security
WHITE PAPER: Cross-site scripting (XSS) attacks are a rising concern for all industries and will continue to be a favored strategy for cybercriminals. With a proactive and strategic approach, your organization can ensure web application security. Read on to learn more.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Tala Security

2019–2020 Global Application & Network Security Report
sponsored by Radware
ANALYST REPORT: To provide insight into the complex challenges faced by organizations as they seek to balance business agility and security requirements, Radware produced a Global Application & Network Security Report. Download the report to explore real attack data, analyses of developing trends and technologies, and findings from a global industry survey.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Radware

Cisco Umbrella & Duo Security: Protect users and secure access to applications
sponsored by Cisco Umbrella
DATA SHEET: As remote workstations and BYOD devices continue to rise in popularity, traditional perimeter security tactics need to me revised with focus on the network and applications. In this data sheet, discover how Cisco Umbrella and Duo Security solutions work together to achieve secure access to any device.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

Cisco Umbrella

Closing the Website Security Gap: Why a WAF Is Not Enough
sponsored by Tala Security
WHITE PAPER: Although web application firewalls (WAFs) have a come a long way in recent years, they remain ineffective as a standalone security solution against Magecart cyberattacks. This white paper underlines the shortcomings of WAFs and highlights the importance of protecting the browser-side and the client-side from threats.
Posted: 15 Jan 2020 | Published: 15 Jan 2020

Tala Security

Alert Logic: SIEMless Threat Management
sponsored by Alert Logic
WHITE PAPER: Ensuring security for AWS applications requires resource-intensive visibility and monitoring, which may be too costly for some users. This checklist highlights the key considerations for self-assessing your program to help guide you towards a more secure AWS application environment.
Posted: 15 Jan 2020 | Published: 15 Jan 2020

Alert Logic

Unbreakable API: Best Practices for AppSec Testing
sponsored by WhiteHat Security
WEBCAST: Modern API development is creating more and more entry points in an application’s architecture for cyberattacks. In this WhiteHat webinar, chief scientist Eric Sheridan goes through some best practices for APIs, including industry perspectives, AppSec breakdowns, and more. Get up to date with your API security strategy. Watch the webinar now.
Posted: 14 Jan 2020 | Premiered: Jan 14, 2020

WhiteHat Security

Javascript vs Javascript: Performance Penalty of Api Hooking
sponsored by Tala Security
WHITE PAPER: While it’s intuitive that defending your code is an important practice, there are times when that defense comes at a high cost.In this white paper, get an overview of the performance penalties associated with hooking browser JavaScript APIs to defend against JavaScript based threats.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Tala Security

The State of Security Segmentation
sponsored by Illumio
WHITE PAPER: As cyberattacks grow increasingly common, it’s critical to look at how criminals operate in order to prevent damage. Read on to uncover the research findings of a recent study designed to shed light on the current state of security segmentation, and why it’s preferable compared to traditional firewalls.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

Illumio

Best Practices for Office 365 Security Monitoring
sponsored by AT&T Cybersecurity
RESOURCE: In order to realize the full benefits of Office 365 cloud applications, establishing an appropriate cloud security strategy is essential. As with any new technology, there are valid security concerns to consider before making the switch. In this white paper, discover the security monitoring best practices for Office 365.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

AT&T Cybersecurity

2018 Global Study on Application Security
sponsored by Arxan
RESEARCH CONTENT: Ponemon Institute conducted a survey to understand the risk that unprotected applications pose to businesses when running in unsecured environments and how organizations are addressing this risk in practice. In this research report, learn about key findings from the survey.
Posted: 31 Dec 2019 | Published: 31 May 2018

Arxan

State of the Internet: Financial Services Attack Economy
sponsored by Akamai Technologies
WHITE PAPER: The financial service industry faces a wide area of cybersecurity threats, including password problems, phishing, mobile application attacks, and more. Being aware of the most current attack trends can be critical for the security of sensitive data. This research report breaks down the specific challenges and threats within the industry.
Posted: 27 Dec 2019 | Published: 31 Jul 2019

Akamai Technologies

Beyond SD-WAN: Zero Trust Security and the Internet as Corporate WAN
sponsored by Akamai Technologies
WHITE PAPER: Read this white paper to learn why Internet is the corporate WAN of the near future, and how enabling safe traffic to go straight to the Internet, blocking bad traffic, and only proxying risky traffic, delivers simplified security, lower latency and better performance, fewer broken web pages and applications.
Posted: 27 Dec 2019 | Published: 30 Jun 2019

Akamai Technologies

Intelligent Security Starts at the Edge
sponsored by Akamai Technologies
DATA SHEET: In Gartner’s most recent Magic Quadrant installment for Web Application Firewalls (WAF), they named Akamai a Leader for the third year in a row. This white paper provides an overview of the benefits of WAF, and highlights Akamai’s approach to WAF. Read on to get started.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Akamai Technologies

Preventing Unknown, Zero-Day Attacks
sponsored by Checkpoint Software Technologies
DATA SHEET: The increasing reliance of mobile devices to conduct business operations organizations vulnerable to hackers who would look to expose these weaknesses. In this solution brief, learn more about the benefits and features of Check Point SandBlast Mobile and discover how it compares to similar industry offerings.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Checkpoint Software Technologies

WhiteHat Software Composition Analysis
sponsored by WhiteHat Security
WHITE PAPER: Leveraging 3rd party code is dangerous due to the unknown security risks – this makes software composition analysis an essential practice for all open source users. Open this open source briefing to review whether you should consider implementing a software composition analysis tool to safeguard your open source reliance.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

WhiteHat Security

WhiteHat eLearning Computer-Based Training
sponsored by WhiteHat Security
WHITE PAPER: Leveraging online developer trainings are a quick and effective way to resolve your security centric development hurdles. Download this whitepaper for an overview of 4 security training paths designed to enhance developer security practices.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

WhiteHat Security

2019 Application Security Statistics Report: The DevSecOps Approach
sponsored by WhiteHat Security
WHITE PAPER: Despite the growing emphasis IT teams place on application security, too many enterprises still fall prone to risks as a result of legacy procedures, lack of coordination, and negligence. Download this application security report for a wide range of takeaways from survey IT teams, and 4 recommendations to leverage in your own DevSecOps.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

WhiteHat Security

Accelerate Innovation with Automated Security
sponsored by Sonatype
WHITE PAPER: The convenience of open source software for developers is unmatched. However, it’s critical to consider the vulnerabilities of open source software when developing security policies. In this white paper, go in-depth into the Nexus Platform for protecting your organization’s software development lifecycle.
Posted: 20 Dec 2019 | Published: 20 Dec 2019

Sonatype

Application Shielding First Line of Defense for Financial Apps
sponsored by Intertrust
WEBCAST: In this webinar, join Paul Butterworth, the Director of Product Marketing at Intertrust, as he discusses the risks your financial applications face, best practices for protecting applications, IP and keys and explore some real-world examples from financial services.
Posted: 18 Dec 2019 | Premiered: Oct 29, 2019

Intertrust

Application Shielding with Intertrust whiteCriterion Code Protection
sponsored by Intertrust
WHITE PAPER: Traditional parameter security measures lack the flexibility needed to meet mobile and IoT security risks. This white paper goes in-depth into the specific security challenges hackers are using to expose application vulnerabilities and defines the tactics and tools that can be implemented to mitigate these risks.
Posted: 17 Dec 2019 | Published: 31 Aug 2018

Intertrust

Gentek Global Secures Payment Systems with Application Shielding
sponsored by Intertrust
CASE STUDY: In this case study, discover how Gentek, a payment systems security company, partnered with Intertrust to deploy robust application shielding for its payment systems in order to protect user data and adhere to regulatory requirements of the payments industry.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

Intertrust

Taking Steps to Protect Financial Mobile Applications
sponsored by Intertrust
WHITE PAPER: Although the popularity of mobile applications has greatly simplified the use of day-to-day financial operations for the end user, it has created additional workload for ensuring their security. In this white paper, take an in-depth look into the world of financial mobile applications and learn practical ways to ensure protection.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

Intertrust

Reverse Engineering Still a Serious Problem in 2019
sponsored by Intertrust
WEBCAST: While mobile applications and interconnected devices offer unmatched convenience, they also expose organizations and consumers to cybersecurity risks. This webinar breaks down common mobile application security threats and highlights real-life reverse engineering examples.
Posted: 12 Dec 2019 | Premiered: Nov 8, 2019

Intertrust

Preventing PeopleSoft Breaches
sponsored by Appsian
WHITE PAPER: Due to the ever-evolving threat landscape, organizations are facing data breaches from both outside and within the perimeter. As a result, IT security teams need to rethink their traditional security strategies, which focus primarily on the perimeter, and shift towards application and credential-level security. Read on to learn more.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Appsian
1 - 25 of 655 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info