IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
26 - 50 of 870 Matches Previous Page  |  Next Page
The Devops Effect
sponsored by Veracode, Inc.
WEBCAST: There are several core principles that you must look at when adopting DevSecOps. Watch this short video to learn what you need to do now and in the future to migrate smoothly.
Posted: 24 Jan 2018 | Premiered: Jan 24, 2018

Veracode, Inc.

The Cyber Security at Your Company is at Risk
sponsored by Veracode, Inc.
WEBCAST: Click inside to learn how you can gain end-to-end, cloud-based platform security for both your endpoints and your application layer.
Posted: 24 Jan 2018 | Premiered: Jan 24, 2018

Veracode, Inc.

Secure Cloud Collaboration without the Complication
sponsored by Citrix
WHITE PAPER: There are still some lingering doubts about the cloud's ability to maintain high security standards, but you can put them to rest. Read this white paper to learn how cloud-based collaboration tools are securing the apps, data, files, and services you depend on every day to provide a safe collaboration space for your employees.
Posted: 24 Jan 2018 | Published: 19 Dec 2017

Citrix

Why Websites Stay Vulnerable: And What You Can Do About It
sponsored by Whitehat Securities
VIDEO: Web application attacks represent a major threat to an organization's security posture. According to the Verizon DBIR, 30% of breaches involve web attacks. Take a look at this webinar to learn about vulnerabilities within websites and how you can increase your web application security.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

Whitehat Securities

Web Application Authorization and Authentication Explained
sponsored by Whitehat Securities
VIDEO: According to the 2017 Verizon DBIR, 30% of total breaches reported involved attacks on web applications. Explore this webinar to gain insight into application authorization and authentication in order to enhance your application security program.
Posted: 24 Jan 2018 | Premiered: 24 Jan 2018

Whitehat Securities

SyncDog Metropolitan Police Department Case Study
sponsored by SyncDog
WHITE PAPER: In this case study, find out how a large metro police department faced dramatic improvements of workflow and compliance for handling of crime-scene data.
Posted: 24 Jan 2018 | Published: 28 Sep 2017

SyncDog

Application Security Testing Magic Quadrant
sponsored by Whitehat Securities
RESOURCE: Application security testing (AST) is growing faster than any other market. Gartner predicts that by 2019, 80% of application security testing vendors will include software composition analysis in their offerings. This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's AST programs as well as a market overview.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Whitehat Securities

2017 Application Security Statistics Report
sponsored by Whitehat Securities
VIDEO: According to the Verizon DBIR, 30% of total breaches reported involved attacks on web applications. This webinar explores effective application security programs by using data from the WhiteHat Application Security Statistics Report.
Posted: 23 Jan 2018 | Premiered: 16 Jan 2018

Whitehat Securities

Getting the Most out of your AppSec Program
sponsored by Whitehat Securities
VIDEO: According to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program.
Posted: 23 Jan 2018 | Premiered: 23 Jan 2018

Whitehat Securities

SAP Cloud Platform Solution Brief: Build Applications to Meet Individual Business Needs
sponsored by SAP
WHITE PAPER: Learn about the SAP Cloud Platform and find out how to take a PaaS-based approach to building, testing, and integrating personalized, mobile-enabled cloud apps quickly.
Posted: 23 Jan 2018 | Published: 31 Dec 2017

SAP

Cross-Site Scripting Attacks: Identify and Defend against Malicious Code
sponsored by Whitehat Securities
VIDEO: Learn about a proactive security and code testing platform that enables you to monitor large amounts of code across 5 common programming languages so that you can identify and resolve incidents of malicious code across web and mobile apps faster.
Posted: 22 Jan 2018 | Premiered: 16 Jan 2018

Whitehat Securities

State of Application Security: Balancing Speed and Risk
sponsored by Whitehat Securities
RESEARCH CONTENT: Explore this SANS report of over 200 IT professionals to see how businesses balance the need to work quickly while also managing risks.
Posted: 22 Jan 2018 | Published: 31 Oct 2017

Whitehat Securities

Design Secure Software from the First Line of Code
sponsored by Whitehat Securities
WHITE PAPER: Explore 6 benefits for developers of a fully automated static analysis security testing (SAST) tool that can bring a focus on security into the beginning of the software development lifecycle.
Posted: 22 Jan 2018 | Published: 31 Dec 2017

Whitehat Securities

Just in Time Access
sponsored by Identity Automation
EBOOK: As the number of employees, vendors, contractors, and departments within an organization grows, the complexity associated with managing access to applications and systems does too. This e-book explores how to more easily manage user access within your organization.
Posted: 22 Jan 2018 | Published: 22 Jan 2018

Identity Automation

DevSecOps Blueprint
sponsored by Whitehat Securities
WEBCAST: The average time to fix vulnerabilities in the DAST industry is 174 days. Take a look at this webcast to uncover successful DevSecOps implementations and data to guide the deployment of DevSecOps in your organization.
Posted: 22 Jan 2018 | Premiered: Jan 22, 2018

Whitehat Securities

CPaaS Market: Using CPaaS as a Route to Communication-Rich Applications
sponsored by Vonage
RESOURCE: In this resource, discover how enterprises are quickly becoming software companies to leverage APIs as the building blocks upon which to create their CPaaS platforms.
Posted: 19 Jan 2018 | Published: 14 Dec 2017

Vonage

A WhiteHat Sentinel Product Family Overview
sponsored by Whitehat Securities
WHITE PAPER: In this white paper learn how WhiteHat Sentinel, a SaaS product suite combines application scanning with one of the world's largest threat research team to provide you with 3 different types of analysis to ensure your apps are safe, no matter where they live.
Posted: 19 Jan 2018 | Published: 30 Dec 2016

Whitehat Securities

Discover Static Applications Security Testing for Microservices
sponsored by Whitehat Securities
WHITE PAPER: In the race to get to market, the last thing you want is to overlook the security of your microservices architecture. Don't leave your development process vulnerable. Click inside to learn about a Static Applications Security Testing (SAST) offering that allows you to ensure your microservices are as safe as possible.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Whitehat Securities

NEAT Evaluation for Applause Crowdtesting
sponsored by Applause
WHITE PAPER: Learn about Applause's crowdtesting platform for web, mobile, and IoT apps and find out if crowdtesting suits your development projects.
Posted: 19 Jan 2018 | Published: 31 Dec 2017

Applause

The DevSecOps Global Skills Survey
sponsored by Veracode, Inc.
RESEARCH CONTENT: This DevSecOps Global Skills Survey looks at the responses from 400 DevOps professionals on the state of DevOps workforces and education. Gain insight into how developers, IT ops, QA professionals, and even security view current DevOps and DevSecOps practices.
Posted: 18 Jan 2018 | Published: 18 Jan 2018

Veracode, Inc.

A Strategic Approach to Web Application Security
sponsored by Whitehat Securities
WHITE PAPER: App vulnerabilities originate with the source code, and you'll want to secure more of your source code in both development and production. But it's easier said than done for security pros to review source code continuously. Uncover a new static application security testing subscription service to address this problem.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

Whitehat Securities

Getting the Board on Board with Application Security
sponsored by Whitehat Securities
WHITE PAPER: CISOs need to make sure their business considers AppSec from the highest levels. Review these 4 recommendations to improve your business' AppSec and get the support you need.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

Whitehat Securities

Privilege Manager Tool
sponsored by Thycotic
WHITE PAPER: Targeted attacks are always after accounts with highly elevated privileges on sensitive and critical systems: privileged accounts. Explore this resource to gain insight into least privilege management and endpoint security strategies.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

Thycotic

Don't Switch To Windows 10 Without An Endpoint Security Plan
sponsored by Thycotic
WHITE PAPER: According to the Thycotic 2017 BlackHat Report, 73% of hackers report that traditional anti-virus tools are irrelevant or obsolete, and don't adapt quickly enough to block emerging threats. This resource offers endpoint and application security strategies as well as tactics to enhance your Windows 7 and 10 security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Thycotic

Top 10 Keys to Successful Least Privilege Adoption
sponsored by Thycotic
WHITE PAPER: According to Thycotic, 85% of breaches involve compromised endpoints. Explore this resource to learn about endpoint attacks and strategies for enhanced endpoint and application security.
Posted: 19 Jan 2018 | Published: 19 Jan 2018

Thycotic
26 - 50 of 870 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement