IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
51 - 75 of 870 Matches Previous Page  |  Next Page
Whitehat's Recent Offerings Put Security Expertise at the Developer's Fingertips
sponsored by Whitehat Securities
WHITE PAPER: Read through 451 Research's assessment of WhiteHat Scout and how the product broadens WhiteHat Security's capabilities.
Posted: 17 Jan 2018 | Published: 06 Dec 2017

Whitehat Securities

The Art of Application Security: Getting Started with DevSecOps
sponsored by Whitehat Securities
WHITE PAPER: According to the Verizon DBIR, 60% of breaches involved web app attacks. Take a look at this white paper to discover best practices for application security as well as a case study example to prove the benefits of the application security best practices.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Whitehat Securities

Your Chance to Get It Right: Five Keys to Building AppSec into DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Watch this webcast to learn how to get app security pros involved in the collaborative DevOps culture by helping developers speak their language. You'll find 5 steps your company can take to achieving secure DevOps inside.
Posted: 17 Jan 2018 | Published: 17 Jan 2018

Veracode, Inc.

Unified MTD + MARS is the Best Practice for Mobile Security
sponsored by Lookout
WEBCAST: Download this webcast to understand the full mobile risk matrix and discover how mobile threat defense (MTD) combined with mobile app reputation services (MARS) can protect your organization from mobile threats to apps, devices, networks and more.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

Lookout

The ROI of AppSec: Getting your Money's Worth from your AppSec Program
sponsored by Veracode, Inc.
WEBCAST: Access this webcast to gain a better understanding of the impact of application security on the end-to-end software development value chain. Then, discover how much it really cost to fix security vulnerabilities in relation to application development.
Posted: 16 Jan 2018 | Premiered: Jan 16, 2018

Veracode, Inc.

2017 Application Security Statistics Report
sponsored by Whitehat Securities
RESOURCE: According to the Verizon 2017 DBIR, 30% of total breaches reported involved attacks on web applications. This 60-page application security statistics report provides perspective on the present application security posture of hundreds of organizations, so that enterprises like yours can understand and improve their own security.
Posted: 16 Jan 2018 | Published: 16 Jan 2018

Whitehat Securities

Mobile Threat Report
sponsored by Lookout
WHITE PAPER: With mobile threats becoming increasingly sophisticated it's more important than ever for organizations to know what threats they face, and how those threats can cause data loss, compliance infringement, and brand reputation damage. Download this white paper to uncover the latest mobile threats to your organization.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Lookout

The Security Professional's Role in a DevSecOps World
sponsored by Veracode, Inc.
WHITE PAPER: Learn about the evolving role of security professionals in the world of DevSecOps, and find out where app security fits into the shifting app development paradigms created by DevOps cultural changes.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Veracode, Inc.

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: According to a recent Verizon study, 40% of confirmed data breaches resulted directly from web app attacks. Explore this white paper to uncover a 3-step guide to gaining a mature application security program to prevent falling victim to damaging data breaches.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Veracode, Inc.

Move Mission-Critical Workloads Into the Cloud
sponsored by AdvizeX Technologies
WHITE PAPER: With more enterprises looking to invest the majority of IT budgets in the cloud, you need a cloud platform built to address the unique needs of mission-critical applications including security, compliance, and guaranteed performance and service levels. Read on to learn more.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

AdvizeX Technologies

Worldwide Mobile Threat Management Security Software Vendor Assessment
sponsored by Lookout
ANALYST REPORT: The mobile security market is expanding and you need to know how to evaluate the different vendors. This IDC report discusses how you can go about your own evaluation process and breaks down one of the leading vendors as an example.
Posted: 12 Jan 2018 | Published: 29 Sep 2017

Lookout

The Business Case for Mobile Security
sponsored by Lookout
EBOOK: Mobility is the way of the future, so you need to protect your mobile devices. This e-book chapter presents the case for mobile security and how you can convince the different decision-makers that mobile threats are real and worth the investment to defend against.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Lookout

State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: According to this report the top 10 list of most common vulnerability categories in 2017 is strikingly similar to 2016. Information leakage was again the most prevalent, present in 66% of apps on initial scan. Inside this report, State of Software Security, uncover trends over time, benchmark performance, and identify best practices.
Posted: 12 Jan 2018 | Published: 28 Dec 2017

Veracode, Inc.

Top DevOps Priorities
sponsored by CollabNet
RESOURCE: CollabNet recently conducted an online DevOps survey with more than 200 participants to identify their highest priorities and most common perceptions in regards to DevOps and optimizing software delivery value streams. Discover the results to learn more about the current state of DevOps.
Posted: 12 Jan 2018 | Published: 31 Dec 2017

CollabNet

Trusted Access For Painless Security
sponsored by Duo Security
RESOURCE: Learn how to help reduce risk of a data breach caused by compromised credentials, known vulnerabilities, or exploits and how to verify your users' identity up front through authentication.
Posted: 12 Jan 2018 | Published: 12 Jan 2018

Duo Security

The State of Software Security: Developer Guide
sponsored by Veracode, Inc.
WHITE PAPER: This State of Software Security report examines the increased burden on developers to ensure sound app security testing, particularly in DevOps and Agile environments. Discover best practices to improve app security testing and remediation, and learn about the tenets of DevSecOps.
Posted: 12 Jan 2018 | Published: 31 Dec 2017

Veracode, Inc.

Analyst Report: Static Application Security Testing, Q4 2017
sponsored by Synopsys
RESEARCH CONTENT: In this Forrester Research report, compare 10 top vendors such as Synopsys, IBM and CA Veracode in various areas of static application security testing.
Posted: 11 Jan 2018 | Published: 12 Dec 2017

Synopsys

APIs: The New Language of Business Collaboration
sponsored by Red Hat
WHITE PAPER: Explore the role played by APIs in enabling the agility demanded by the disruptive business world of digital transformation.
Posted: 11 Jan 2018 | Published: 31 Dec 2017

Red Hat

Best Practices: Strategies For Making The Crucial Shift To DevSecOps
sponsored by Veracode, Inc.
RESEARCH CONTENT: This Forrester Research report examines the importance of incorporating security into DevOps methodologies. Discover 3 steps for shifting from DevOps to DevSecOps and find out how to deliver high-quality apps faster.
Posted: 11 Jan 2018 | Published: 01 May 2017

Veracode, Inc.

The Developer's Guide to Software Integrity
sponsored by Synopsys
WHITE PAPER: Explore the importance of DevSecOps in building high-quality apps and learn which tools are best suited to helping developers identify and resolve the bugs that can lead to crashes or act as points of entry for attackers.
Posted: 11 Jan 2018 | Published: 31 Dec 2017

Synopsys

Microservices vs. Service-Oriented Architecture
sponsored by NGINX
WHITE PAPER: Both microservices architecture and SOA are considered service-based architectures with shared characteristics, but very different architecture styles. This 50+ page e-book compares the two architectures to enable you to make the best choice to meet your organization's unique needs.
Posted: 11 Jan 2018 | Published: 11 Jan 2018

NGINX

Filling the Gaps in Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper provides information from an Osterman Research survey regarding users' experience with Office 365 security.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Proofpoint, Inc.

Castles in the Cloud: Security and Compliance for Office 365
sponsored by Proofpoint, Inc.
EBOOK: Email makes it easy for attackers to exploit the "human factor" of security and steal credentials, data and more. In fact, 91% of targeted attacks target people, according to Proofpoint. This e-book offers strategies for enhancing your Office 365 security posture by improving compliance and threat detection techniques.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Proofpoint, Inc.

The Developers Guide to the DevSecOps Galaxy
sponsored by Veracode, Inc.
WHITE PAPER: Learn about the top app security challenges for DevOps methodologies and find out how to bolster app development with best practices for DevSecOps.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Veracode, Inc.

Secure DevOps Survival Guide
sponsored by Veracode, Inc.
WHITE PAPER: DevOps is the most disruptive trend affecting secure development today. This resource provides you with the importance of securing DevOps and everything to know when adopting a DevOps approach.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Veracode, Inc.
51 - 75 of 870 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement