IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
51 - 75 of 671 Matches Previous Page  |  Next Page
Whitehat Security Webinar
sponsored by WhiteHat Security
WEBCAST: Dynamic Application Security Testing (DAST) enables AppSec teams with the ability to assess and address the actual risk of their applications – providing critical security capabilities to support DevSecOps initiatives. Watch this webinar to learn more about DAST and how it can support your AppSec goals.
Posted: 10 Dec 2020 | Premiered: Dec 10, 2020

WhiteHat Security

Leveraging DevSecOps to Secure Cloud-Native Applications
sponsored by Crowdstrike
ANALYST REPORT: Changes to application architectures and the infrastructure platforms hosting them is antiquating existing cybersecurity technologies and challenging traditional methods of protecting business-critical workloads. In this ESG survey, learn what cloud security technology professionals reported when asked about securing cloud-native applications.
Posted: 09 Dec 2020 | Published: 09 Dec 2020


The State of Application Security
sponsored by WhiteHat Security
WEBCAST: Attackers continue to take advantage of application flaws to compromise organizations and put their customers at risk. This means that as much as Dev teams prioritize faster release cycles, it’s important that they don’t overlook security. In this WhiteHat webinar, examine the state of application security and what you can do to stay protected.
Posted: 09 Dec 2020 | Premiered: Dec 9, 2020

WhiteHat Security

Enable and Educate Your Team
sponsored by WhiteHat Security
DATA SHEET: Too many cyberattacks come from subpar employee enablement and/or security misconfigurations. WhiteHat is looking to resolve this issue with their eLearning Platform, designed to educate your users on common application security threats, best practices, incident remediation, and more – read on to learn more about the platform.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

WhiteHat Security

Does your AppSec Program Get An A+?
sponsored by WhiteHat Security
WEBCAST: Applications are critical to an organization’s ability to communicate internally as well as with end-users or other third parties. As a result, apps are a quickly becoming a prime target for cybercriminals. Watch this webinar to learn more about the AppSec landscape, including what the common threats are and where pressure is rising.
Posted: 07 Dec 2020 | Premiered: Dec 7, 2020

WhiteHat Security

Security in the Fast Lane
sponsored by WhiteHat Security
WEBCAST: Today’s organizations rely on a collection of applications in order to maintain internal operations and interact with end-users. However, dangerous threats targeting data in these critical apps have emerged. Watch this webinar to learn more about the application security threat landscape, notable breaches and how to protect your apps.
Posted: 04 Dec 2020 | Premiered: Dec 4, 2020

WhiteHat Security

Cybersecurity: It's a Team Sport
sponsored by WhiteHat Security
WEBCAST: During the pandemic, cybercrime has quadrupled, leaving many organizations scrambling to strengthen their security posture. In this webinar, learn why it’s more important than ever for vendors, partners and customers to work together and build a true cybersecurity team to combat the evolving threat landscape.
Posted: 03 Dec 2020 | Premiered: Dec 3, 2020

WhiteHat Security

How a Northeastern State Strengthened Application Security for their Voter Registration System
sponsored by WhiteHat Security
CASE STUDY: Elections are very heavily targeted by threat actors. Troublemakers as they are, these actors will go to great lengths to breach voter privacy, even by accessing user information to impersonate voters. One state recognized this and wanted to ensure the security of their voter registration apps. See this case study to learn how they did it.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

WhiteHat Security

If You Think You Can’t Afford to Protect Office 365, Think Again.
sponsored by arcserve
DATA SHEET: 56% of businesses use Office 365, yet most leave themselves wide open to cyberattacks and data loss without third-party protection. Why? Many assume Microsoft is backing up their data, but it’s actually up to you – the user – to protect from the unknown. So how can you start? Examine this data sheet to see a good first step.
Posted: 01 Dec 2020 | Published: 01 Dec 2020

arcserve

The State of Election Security
sponsored by WhiteHat Security
WEBCAST: The topics of voter registration and election security were top-of-mind in 2020 – but what did we learn that we can use to better ourselves going forward? Watch this webinar, which overviews the state of election security, common threats, and best practices.
Posted: 30 Nov 2020 | Premiered: Nov 30, 2020

WhiteHat Security

Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS
sponsored by ComputerWeekly.com
EZINE: In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.
Posted: 23 Nov 2020 | Published: 24 Nov 2020

ComputerWeekly.com

Addressing Complexity and Expertise in Application Security Testing
sponsored by WhiteHat Security
RESEARCH CONTENT: The Verizon’s 2020 DBIR indicated that 43% of data breaches begin by targeting a web application. This discovery has begun to shift the cybersecurity paradigm from focusing on on-premise infrastructures to protecting their web apps with application security testing (AST). Read this 451 Research brief to learn more about AST.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

WhiteHat Security

Your Guide to DNS Security
sponsored by TechTarget
RESOURCE: Which of the following web and application security technologies is your company planning to purchase within the next 12 months? Secure application development and testing, web security, or application and container security? Let us know in our Web & Application Security Survey. As a thank you, you'll receive our expert guide.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

TechTarget

Reduce API Security Risks with Automated and Continuous API Scanning
sponsored by WhiteHat Security
WEBCAST: Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent history. How do we reduce API security risks? View this webcast to learn why testing may be the key.
Posted: 20 Nov 2020 | Premiered: Jul 15, 2020

WhiteHat Security

10 Tips to Strengthen your Insider Threat Program
sponsored by Dtex
EBOOK: With the commonality of remote work creating more vulnerability than ever, strengthening threat detection has become paramount. But how do you go about putting your eggs in the right security baskets? Read this explosive e-book for 10 tips for strengthening your insider threat program.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Dtex

How a Top Financial Firm Scaled Their Application Security Program & Accelerated Their Digital Transformation
sponsored by WhiteHat Security
CASE STUDY: A top 10 U.S. bank was faced with the challenges of scaling application security automation, regulatory compliance and triaging false positives from an automated scanner. And after factoring in time and budget constraints, it’s clear that this was a tall mountain to climb. Read this case study to see how they reached the top.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

WhiteHat Security

Rethinking Insider Risk in the Gig Economy
sponsored by Proofpoint
EBOOK: By 2027, gig workers may account for half of the total U.S. workforce. It’s a major shift that comes with profound security implications. Some 87% of companies have suffered an incident with a third-party supplier that disrupted their operations, according to Deloitte. View this e-book to learn how to mitigate insider risk in the new work reality.
Posted: 18 Nov 2020 | Published: 30 Oct 2020

Proofpoint

Why DevOps Has Not Become DevSecOps
sponsored by WhiteHat Security
WEBCAST: Access this white paper to see the 6 myths that are contributing to the lack of DevSecOps adoption, watch as they are easily debunked, and learn 8 recommendations moving forward with this new understanding.
Posted: 18 Nov 2020 | Premiered: Nov 18, 2020

WhiteHat Security

2020 Election Security
sponsored by WhiteHat Security
WHITE PAPER: Around the globe, we’ve witnessed how cybercriminals can create chaos during election cycles by disqualifying legitimate voters, corrupting voter data and launching denial-of-service attacks. In recent years, U.S. elections have come under continuous assault. See this white paper to learn about the security challenges this causes for the country.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

WhiteHat Security

DevSecOps Framework – Technical Deep Dive
sponsored by WhiteHat Security
WEBCAST: Organizational infrastructure is becoming more and more vulnerable, and as a result, development teams are searching for ways to securely develop, build and deploy business-driving applications. So, what can these teams do to get started? They can begin by watching this webcast to learn the keys to a successful DevSecOps implementation.
Posted: 16 Nov 2020 | Premiered: Nov 16, 2020

WhiteHat Security

WhiteHat Pen Test Service
sponsored by WhiteHat Security
DATA SHEET: In this guide, learn how to maximize your application security with automated and continuous web application scanning plus periodic pen testing to find and fix crucial vulnerabilities faster. This advanced approach will significantly reduce the risk of data breaches and other cybersecurity incidents. Get the details first-hand here.
Posted: 13 Nov 2020 | Published: 13 Nov 2020

WhiteHat Security

Using digital twins to cut costs and improve safety at Shell
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.
Posted: 09 Nov 2020 | Published: 10 Nov 2020

ComputerWeekly.com

Secure SD-WAN: A Comprehensive Guide
sponsored by Fortinet, Inc.
WHITE PAPER: With the rapid rise in SaaS and IaaS use, many network engineering and operations leaders are looking to replace their outdated WAN infrastructures with SD-WAN. While selecting the right SD-WAN for a particular use case may require a few compromises, security shouldn’t be one of them. Access this guide to learn about secure SD-WAN.
Posted: 29 Oct 2020 | Published: 03 Oct 2019

Fortinet, Inc.

Container Security Vulnerabilities: How to Avoid Them and Stay Secure
sponsored by TechTarget
RESOURCE: Inside our new Essential Guide to Container Security, discover: What's changed in container security since the initial Docker release, 5 types of container and orchestrator vulnerabilities, and lessons learned from a past Kubernetes vulnerability. To gain FREE access to this expert guide, please complete our online survey.
Posted: 27 Oct 2020 | Published: 01 Nov 2020

TechTarget

Don't be Afraid of Cloud Security
sponsored by Apcela
WEBCAST: The push to move applications and services to the cloud often opens security vulnerabilities that you read about as headlines. Conversely, the fear of these security events results in network policy that inhibits the speed and performance of business. Watch this webcast for a discussion on balancing speed and security from a CIO’s perspective.
Posted: 07 Oct 2020 | Premiered: Oct 31, 2019

Apcela
51 - 75 of 671 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info