IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflows Multimedia (View All Report Types)
 
Simplify Authentication with Personal Identity Verification
sponsored by HID Global
VIDEO: It's no secret that passwords are a pain for users and IT. This video discusses how personal identity verification (PIV) can make authentication simpler for your users.
Posted: 11 Aug 2017 | Premiered: 11 Aug 2017

HID Global

Mobile Application Security: Discovering Leaks and Remediation
sponsored by WhiteHat Security
WEBCAST: 25% of mobile apps have at least one high security risk or privacy flaw. Discover how to overcome the top issues facing mobile security and learn more about key iOS and Android vulnerabilities, mobile app security services, automated mobile app scanning, and more.
Posted: 27 Jul 2017 | Premiered: Jul 27, 2017

WhiteHat Security

Webinar: Scaling Git for the Enterprise
sponsored by WANdisco
WEBCAST: This webinar answers the most common questions when attempting to scale Git for the enterprise including how to manage thousands of users, monitor performance, and ensure compliance with regulatory standards
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

Top Ways to Enhance Security in 2016
sponsored by Intel
PODCAST: Learn about popular security technologies for 2016 and uncover a brief explanation for many of them. Discover which tools you should be using today and which tools will be popular in the coming year.
Posted: 16 Aug 2016 | Premiered: Mar 30, 2016

Intel

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

Apps to the Future: Predicting Enterprise Mobility in 2015
sponsored by Maas360 by IBM
WEBCAST: This webcast dives into the future of mobile enterprise apps as Fiberlink's own Director of Marketing, Jonathan Dale, is joined by IDC's VP for mobility research, John Jackson for a discussion on enterprise app predictions in 2015, and to share advice for mobile success in 2015. Read on to learn more.
Posted: 24 Feb 2015 | Premiered: Feb 24, 2015

Maas360 by IBM

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

BYOD Happens: How to Secure Mobility
sponsored by Citrix
WEBCAST: View this on-demand webcast for an in-depth look at 10 ways to securely optimize mobility with an architecture that spans micro apps, cloud and data protection.
Posted: 14 May 2014 | Premiered: May 14, 2014

Citrix

Aruba’s MultiUse Video
sponsored by Aruba Networks
VIDEO: Why continue managing devices, when you can manage the applications? This video will teach you about enterprise mobile management, and how you can make enterprise mobility a lot simpler. Dive in to learn more.
Posted: 30 Apr 2013 | Premiered: 29 Mar 2013

Aruba Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement