IT Management  >   Systems Operations  >   Security  >  

Application Security

RSS Feed   
ALSO CALLED: Operating System Security, OS Security, Software Security, SQL Injection, Buffer Overflow, Buffer Overflows
DEFINITION: Common Weakness Enumeration (CWE) is a universal online dictionary of weaknesses that have been found in computer software. The dictionary is maintained by the MITRE Corporation and can be accessed free on a worldwide basis. The purpose of CWE is to facilitate the effective use of tools that can identify, find and resolve bugs, vulnerabilities and exposures in computer software before the programs  … 

Application Security definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Application Security Reports
76 - 100 of 671 Matches Previous Page  |  Next Page
Don't be Afraid of Cloud Security
sponsored by Apcela
WEBCAST: The push to move applications and services to the cloud often opens security vulnerabilities that you read about as headlines. Conversely, the fear of these security events results in network policy that inhibits the speed and performance of business. Watch this webcast for a discussion on balancing speed and security from a CIO’s perspective.
Posted: 07 Oct 2020 | Premiered: Oct 31, 2019

Apcela

Real Estate Tech Giant Drives New Revenue Streams with Google Cloud's Apigee
sponsored by SoftServe
CASE STUDY: The fear of exposing APIs to external actors can hold you back. The best way to move forward without fear is with the right API security solution. Learn how the world’s largest real estate technology franchise invested in API security to enhance the customer experience without putting their business or their customers in danger.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

SoftServe

Product Brief: Endpoint Agent
sponsored by Sinefa
WHITE PAPER: Security managers and professionals need endpoint monitoring that allows them to gain actionable insights into end user experience and troubleshoot problems. Most of all, these professionals need visibility over their networks so that they can work to optimize performance. Read this white paper to learn about Sinefa’s Endpoint Agent.
Posted: 24 Sep 2020 | Published: 24 Sep 2020

Sinefa

AppSec for the Newly Hired CISO/CSO
sponsored by Contrast Security
EBOOK: For new CISOs and CSOs, the tasks and demands of the new role can be overwhelming – especially as digital transformation changes conventional approaches to application security. Read this e-book for AppSec guidance and best practices for new CISO/CIOs.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Contrast Security

2020 Application Security Observability Report
sponsored by Contrast Security
WHITE PAPER: Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.
Posted: 21 Sep 2020 | Published: 13 Jul 2020

Contrast Security

What Every Security Professional Should Know About Third-Party OAuth Apps
sponsored by Proofpoint
WHITE PAPER: For CISOs, permitting third-party apps is a constant struggle, especially given the expansive use of cloud applications. What’s important is that security professionals in authentication are up to speed on what keeps a cloud account safe from OAuth attacks. Take a look at this FAQ/checklist to be informed on the risks of third-party apps.
Posted: 08 Sep 2020 | Published: 03 Sep 2020

Proofpoint

The DevSecOps Guide to Managing Open-Source Risk
sponsored by Contrast Security
WHITE PAPER: Open this eBook and examine how you can implement automation for tracking open source components in use, identifying risks, and enabling effective mitigation.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Contrast Security

5 Critical Requirements for Internal Firewalling in the Data Center
sponsored by VMware International Unlimited Company
WHITE PAPER: Forrester reports that 58% of companies faced a significant security incident in 2019 despite spending more to secure their networks. Much of this is due to overreliance on perimeter firewalls, which has been a handicap for organizations in recent years. Open this VMware report to get a glimpse at their next-generation firewall technology.
Posted: 01 Sep 2020 | Published: 31 Mar 2020

VMware International Unlimited Company

Securing Branch Offices and Retail Stores in the Digital Age
sponsored by Palo Alto Networks
WHITE PAPER: The advancement of the branch office is matched only by the evolution of network threats. With networking solutions such as SD-WAN now on the market, organizations must rethink their branch office security. Read this white paper outline the challenges of branch security and view typical use cases.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Palo Alto Networks

Next-Generation Firewall Buyer’s Guide
sponsored by Palo Alto Networks
RESOURCE: Cloud adoption, big data analytics, machine learning and automation are all accelerating the delivery of applications, which in and of themselves are becoming increasingly accessible. However, this also means that apps are more vulnerable than ever. Browse this guide to learn how Next-Gen Firewalls can minimize risk without slowing you down.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

How Manual Application Vulnerability Management Delays Innovation and Increases Business Risk
sponsored by Contrast Security
EBOOK: More often than not, development and security teams are at odds. In fact, as many as 52% of companies admit to cutting back on security measures in order to meet business demands, according to Contrast Security. In this report, learn how organizations can approach security with fewer frustrations and more collaboration between teams.
Posted: 27 Aug 2020 | Published: 27 Aug 2020

Contrast Security

Magic Quadrant for Application Security Testing
sponsored by Contrast Security
ANALYST REPORT: The Application Security Testing (AST) market has evolved quickly as organizations scramble to secure their cloud native and modernized applications. This Gartner Magic Quadrant assesses which vendors are leading the AST market right now, and what technologies are setting these providers apart.
Posted: 27 Aug 2020 | Published: 29 Apr 2020

Contrast Security

Contrast OSS Helps DevOps Manage & Triage Hidden OSS Library Risk
sponsored by Contrast Security
EBOOK: Download this eBook to learn about a new approach to OSS security: Contrast OSS, and how it can help you prioritize critical vulnerabilities by tracking the libraries that actually get used during runtime operation.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Contrast Security

Contrast DevOps-Native AppSec Platform
sponsored by Contrast Security
DATA SHEET: Open-source components have created an entirely new playing field for vulnerabilities and cyberattacks. Security strategies must incorporate security instrumentation to strengthen AppSec platforms and properly accommodate for these new security demands. Learn about the Contrast Security Platform and its 3 components in this guide.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Contrast Security

Bringing an End to Security Roadblocks
sponsored by Contrast Security
EBOOK: From a developer’s perspective, legacy tools create delays at every turn. Luckily, this guide proposes a simple solution: security instrumentation. Learn how security instrumentation builds security monitoring and response into the application itself for continuous insight—and no bottlenecks. Read more here.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Contrast Security

How legacy application security requires experts, time, and cost that degrade DevOps efficiencies
sponsored by Contrast Security
WHITE PAPER: Take a look through this white paper to learn how some of the legacy scanning-based appsec tools at your organization may be complicating your DevOps process, and how you can become even more efficient in deploying more secure apps.
Posted: 25 Aug 2020 | Published: 25 Aug 2020

Contrast Security

A comprehensive approach to analyzing and protecting software
sponsored by Contrast Security
WHITE PAPER: Traditional application security approaches rely on a patchwork of disconnected tools and processes that really end up adding more noise than protection. Find out how you can sort through all of these false positives with this app security platform.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Contrast Security

A major roadblock to business innovation
sponsored by Contrast Security
WHITE PAPER: When fast-moving developers encounter outdated security tools and processes, they are forced to delay releases in order to perform ineffective ceremonial exercises such as generating a scan. You need a more comprehensive and holistic approach to app security. Read this white paper to get started.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Contrast Security

Securing Web Operations for a Fortune 500 Financial Institution
sponsored by Tala Security
CASE STUDY: In this case study, Tala partners with a Fortune 500 financial institution to address key cybersecurity and operational challenges related to the growing volume and usage of web applications. Read on for an in-depth look at the financial institution’s specific challenges, required capabilities, and the results of their partnership with Tala.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

Tala Security

Digital Transformation at the Enterprise Edge
sponsored by Cradlepoint
WEBCAST: Required capacity to connect is at an all-time high. Network security must be threat-ready, WANs must deliver performance and edge-to-cloud latency must be as low as possible. Is your network prepared? Watch this webcast for a deeper view of enterprise digital transformation and the technologies that are taking the lead.
Posted: 05 Aug 2020 | Premiered: Aug 5, 2020

Cradlepoint

Webinar - Defend Better and Respond Faster With Security That Works Together
sponsored by Cisco Umbrella
WEBCAST: Most malware infections happen in one of only 3 ways, so why aren’t they easier to stop? As organizations embrace the cloud, it’s now imperative to find a new approach to securing users and devices. View this webinar to find out how to stop attacks before they start and how to safeguard your organization with a layered approach to cybersecurity.
Posted: 31 Jul 2020 | Premiered: Jul 14, 2020

Cisco Umbrella

Feature Brief: Secure Web Gateway
sponsored by Cisco Umbrella
ANALYST REPORT: Overview of the secure web gateway (full proxy) capabilities that are available in Umbrella. Includes content filtering, anti-virus scans, AMP malware detection, Threat Grid file sandboxing, SaaS app discovery and blocking, granular app controls, and detailed threat intelligence.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

Cisco Umbrella

Webinar - SASE Convergence of Cloud Security and Networking
sponsored by Cisco Umbrella
WEBCAST: It’s the new normal, and ensuring security for this cloud-centered reality is paramount. Businesses must deepen visibility, protection and control of internet traffic while simplifying security deployment and management. Watch this webinar to learn how Cisco is breaking new ground with a SASE as well as unified SD-WAN and cloud security offers.
Posted: 30 Jul 2020 | Premiered: Jun 30, 2020

Cisco Umbrella

SASE For Dummies
sponsored by Cisco Umbrella
EBOOK: Today’s IT teams must securely enable roaming users, devices, and SaaS apps without adding complexity or reducing performance. Likewise, they must develop strategies to protect users from a variety of evolving threats. Read this e-book to examine the changing network and security landscape and steps you can take to keep your organization secure.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Cisco Umbrella

SIG - Farm Credit Customer Story
sponsored by Cisco Umbrella
CASE STUDY: Farm Credit needed to keep customer data secure while protecting its distributed, highly mobile workforce from threats no matter where employees were. They wanted a holistic, secure web gateway solution with robust capabilities, early-lifecycle threat mitigation, and seamless integration. Read this case study to go in-depth on their success.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Cisco Umbrella
76 - 100 of 671 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info