IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed    Add to Google    Add to My Yahoo!
Buffer OverflowMultimedia (View All Report Types)
 
Managing Access Security in a Multi-Perimeter World
sponsored by IBM
WEBCAST: Uncover how an identity and access management strategy can help your organization overcome the risks associated with cloud computing, enterprise mobility, and collaboration in a multi-perimeter enterprise.
Posted: 07 Mar 2013 | Premiered: Dec 31, 2012

IBM

Podcast: How Security is well suited for Agile development
sponsored by IBM
PODCAST: Tune into this podcast to hear from expert, Patrick Vandenberg, manager of IBM rational security and compliance, discuss security for an agile model. Discover key techniques and practices for supporting application security in the agile environment and why how security is linked to the software development lifecycle.
Posted: 09 Jun 2011 | Premiered: Jun 7, 2011, 13:30 EDT (17:30 GMT)

IBM

Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

Deliver Virtual Apps and Desktops as Mobile Services
sponsored by Citrix
VIDEO: This video details a solution to BYOD that will give users the personalized experience they crave while keeping your data secure.
Posted: 24 Oct 2013 | Premiered: 24 Oct 2013

Citrix

College Board Case Study: Quality Software is Secure Software
sponsored by IBM
WEBCAST: In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe.
Posted: 22 Jul 2013 | Premiered: Jul 22, 2013

IBM

Evaluate: IBM Rational AppScan
sponsored by IBM
TRIAL SOFTWARE: With Web applications exposing more sensitive information to anyone with an Internet connection, new security threats are emerging all of the time. IBM Rational AppScan is a leading application security testing suite designed to help manage vulnerability testing throughout the software development life cycle.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011

IBM

This Month in the Threat Webscape -- August 2009
sponsored by Websense, Inc.
VIDEO: The Websense Security Labs Team provides a review of threats occurring during the month of August 2009. Highlighted is the massive DDoS (Distributed Denial of Service) attack on Twitter, Google Blogger, LiveJournal, and Facebook centered around 1 person: Cyxymu, a pro-Georgia blogger who is an active critic of Moscow's politics.
Posted: 08 Oct 2009 | Premiered: 08 Sep 2009

Websense, Inc.

VMware vShield: Secure your Cloud with Virtualization-aware Security
sponsored by VMware, Inc.
VIDEO: Organizations today are leveraging cloud computing to take advantage of increased agility and flexibility at a reduced cost.  Yet, many are making the mistake of using physical security approaches to protect virtualized infrastructures and cloud environments. Find out how you can strengthen your application and data security in the cloud.
Posted: 20 May 2011 | Premiered: 20 May 2011

VMware, Inc.

Developer Training on SharePoint 2010
sponsored by Microsoft Corporation India Pvt Ltd
VIDEO: This training course was designed for professional developers interested in using Microsoft SharePoint 2010 to rapidly develop and deploy solutions. The course contains a series of videos and presentations that will help guide you along the way.
Posted: 10 Dec 2009 | Premiered: 10 Dec 2009

Microsoft Corporation India Pvt Ltd

New Reality of Stealth Crimeware Video
sponsored by Intel
WEBCAST: An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.
Posted: 03 Oct 2012 | Premiered: Oct 3, 2012

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement