IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
1 - 25 of 652 Matches Previous Page  |  Next Page
Ensuring Cloud Security and Compliance in the Financial Services Industry
sponsored by DivvyCloud
WHITE PAPER: In order to meet customer demands, financial service organizations are embracing mobile banking applications. However, teams should be aware of the additional security threats associated with organizational changes. Download this white paper and learn how to ensure cloud security and compliance while embracing digital transformation.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

DivvyCloud

Gaining a Hacker's Perspective of API Vulnerabilities
sponsored by Ping Identity Corporation
WEBCAST: While APIs have enabled organizations to modernize their business operations, most organizations feel that they are also an area of potential weakness. This webinar aims to better understand today’s challenges and how to mitigate them by examining key API threats through the perspective of a hacker.
Posted: 03 Apr 2020 | Premiered: Apr 3, 2020

Ping Identity Corporation

Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: DevOps is transforming the way organizations create, test and release software. An emerging advancement in DevOps is the inclusion of security into software development lifecycle. This white paper highlights 5 key principles for integrating security into the software development lifecycle in order to meet security goals.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Veracode, Inc.

Application Security Fallacies + Realities
sponsored by Veracode, Inc.
EBOOK: As breaches continue to make headlines, organizations are realizing the serious risk posed by applications. Now is the time for organizations of all sizes to understand the fallacies, and the truths, of application security. Download this e-book for 7 fallacies and realities about application security.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

Veracode, Inc.

Veracode Integrations
sponsored by Veracode, Inc.
EBOOK: To keep up with the shift to DevOps and rapid release cycles, application security solutions need to integrate into security and development teams’ existing tools and processes. Learn how the Veracode Application Security Platform integrates with the development, security and risk-tracking tools you may already be using.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

Veracode, Inc.

How Do Vulnerabilities Get into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Veracode, Inc.

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: Although applications are critical to how businesses operate, web apps are among the top risk areas that hackers attempt to expose. In fact, nearly 40% of global data breaches originate at the application-layer. In this guide, discover what effective application security looks like and learn the steps you can take to reach app sec maturity.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Veracode, Inc.

Re-thinking Application Security
sponsored by Tala Security
WHITE PAPER: Although customer-facing applications enable a better user experience, they remain one of the most vulnerable areas of an organization. Traditional security fails to prevent attacks targeting apps – so, how can organizations ensure security? This white paper outlines how to re-think application security in order to address modern threats.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Tala Security

A Tale of Two Teams
sponsored by Veracode, Inc.
EBOOK: The days of security and development working in silos are over. Each team needs to understand and work closely with the other. In this e-book, learn more about the new processes and priorities each team has throughout the software lifecycle.
Posted: 31 Mar 2020 | Published: 31 Mar 2020

Veracode, Inc.

State of Software Security: Executive Summary
sponsored by Veracode, Inc.
RESEARCH CONTENT: The 2019 Veracode State of Software Security represents the 10th version of the report. Gain insight into the high-level application security trends Veracode identified this year in this executive summary of their report.
Posted: 31 Mar 2020 | Published: 31 Mar 2020

Veracode, Inc.

Securing APIs in the Age of Connected Experiences
sponsored by Google
EBOOK: APIs help enterprises to meet customer expectations—but the popularity of APIs has also changed both how bad actors attack and what enterprises must do to keep data safe. This eBook explores how customer expectations have necessitated that businesses apply security and protection at every point of interaction within a connected experience.
Posted: 31 Mar 2020 | Published: 31 Mar 2020

Google

What Is Application Security?
sponsored by Veracode, Inc.
DATA SHEET: As organizations shift from data hosted in traditional databases to application containers, security needs to also shift to reflect this change. This data sheet provides an overview of application security to equip you with the knowledge you need to get started.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Veracode, Inc.

Application Delivery for DevOps
sponsored by Radware
DATA SHEET: Alteon Multi Cloud is an application delivery controller (ADC) solution that facilitates the timely creation and deployment of ADC services across various computing environments. In this brief, learn more about the core functionalities of Radware’s Alteon Multi Cloud.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Radware

Smooth the Transition to the Cloud with Radware’s Secure ADC Solutions
sponsored by Radware
DATA SHEET: Many enterprises are transitioning to the cloud. As a result, their focus shifts from infrastructure-centric environments to application-centric solutions. This creates the unique challenge of how to make advanced services, such as application delivery and security simpler to consume and maintain. In this brief, learn how Radware’s ADC can help.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Radware

Rethinking API Security
sponsored by Okta
VIDEO: APIs enable organizations with new avenues for enhancing business operations and customer experiences. In this session, we’ll cover the foundations of developing, securing, and managing access to the critical APIs that drive our business.
Posted: 26 Mar 2020 | Premiered: 26 Mar 2020

Okta

What’s Wrong With DAST
sponsored by Wallarm
WHITE PAPER: Most security organizations use vulnerability scanners and other DAST tools. However, most of the scanners that are deployed today are limited in their coverage. In this white paper, learn about 3 important areas a scanner must address when conducting scans to ensure full coverage.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

Wallarm

Finds Cost- and Time-Savings with IdentityNow
sponsored by SailPoint Technologies
CASE STUDY: Banking is built upon the transactions it performs daily, and Orrstown Bank needed a solution that could be quickly deployed while also protecting the data and integrity of its transactions. In this case study, learn how Orrstown Bank was able to meet these needs by deploying SailPoint IdentityNow.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

SailPoint Technologies

5 Essential Elements of a Comprehensive Endpoint Security Strategy
sponsored by Cyber-Ark Software
WHITE PAPER: Digital transformation continues to be a top priority at organizations. However, business leaders should be aware that a critical part to the digital transformation journey is reconsidering how you monitor and protect endpoints. In this white paper, discover 5 key elements for an effective endpoint security strategy.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

Cyber-Ark Software

Identity Governance for Workday
sponsored by SailPoint Technologies
VIDEO: As organizations continue to use cloud HR tools, like Workday, to realize the benefits of cloud, they often are still faced with manual challenges related to onboarding and access control. This video highlights the features and capabilities of SailPoint’s integration with Workday, designed to address this issue. Watch now to learn more.
Posted: 16 Mar 2020 | Premiered: 16 Mar 2020

SailPoint Technologies

Integrating Static Application Security Tools (SAST) In DevSecOps
sponsored by Valbrio
WHITE PAPER: Learn how the role of static application security testing tools (SAST) and GrammaTech CodeSonar can be used in DevSecOps and continuous development pipelines to improve quality and security and ultimately, make teams more competitive in getting market leading solutions out the door quicker.
Posted: 13 Mar 2020 | Published: 13 Mar 2020

Valbrio

VMs vs. containers: Which is better for security?
sponsored by ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

ComputerWeekly.com

Hybrid Cloud Security for DevOps - Solution Brief
sponsored by Trend Micro
DATA SHEET: Learn how the Trend Micro Deep Security platform automates security within your DevOps processes and delivers multiple security controls to ensure you meet compliance requirements from the first build.
Posted: 09 Mar 2020 | Published: 09 Mar 2020

Trend Micro

Machine Learning for Finding Programming Defects and Anomalies
sponsored by Valbrio
WHITE PAPER: While static analysis tools can be useful for finding programming flaws and security vulnerabilities in code, they are beginning to be replaced by machine learning-driven tools that can anticipate flaws rather than scan for pre-determined ones. Read on to learn how machine learning is driving this new method of application design.
Posted: 06 Mar 2020 | Published: 25 Dec 2019

Valbrio

The Simple Path to Protecting and Controlling Your Application Data
sponsored by Ionic Security
RESOURCE: Learn how to use Ionic Machina to protect and control access to your application data.
Posted: 04 Mar 2020 | Published: 04 Mar 2020

Ionic Security

Implementing Privacy Policy: Application Security the Easy Way
sponsored by Ionic Security
WEBCAST: The fundamental issue with data protection is that security is often siloed, but sensitive data isn’t, leaving apps and data at risk. This webcast takes a closer look at Ionic Machina, which focuses on data protection through scalability, visibility, and access management controls. Watch now to learn more.
Posted: 04 Mar 2020 | Premiered: Mar 4, 2020

Ionic Security
1 - 25 of 652 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info