IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflow White Papers (View All Report Types)
 
The Stakes Have Changed, Have You? 20 Years of DDoS Attacks Targeting Business
sponsored by Arbor Networks
WHITE PAPER: According to the Worldwide Infrastructure Security Report, 93% of survey respondents experienced application layer-attacks and 56% experienced multi-vector DDoS attacks. Inside, learn how DDoS attacks have evolved and changed over time.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

Arbor Networks

ActivID Authentication Appliance for Enterprise
sponsored by HID Global
WHITE PAPER: While it's a necessity to provide employees, contractors, partners, and customers anytime, anywhere access to appropriate resources, it's also imperative that enterprises are able to maintain their security. Take a look at this white paper to reveal an authentication platform that can help you deliver access to the right users at the right time.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

HID Global

Security for your Cloud-based Web Applications
sponsored by Alert Logic
WHITE PAPER: This Aberdeen Research paper explores the complexity and change in security of cloud-based Web applications and how a "stacked" security approach can prevent DDoS attacks.
Posted: 11 Sep 2017 | Published: 30 Apr 2017

Alert Logic

Sophos Phish Threat
sponsored by Sophos
WHITE PAPER: Look at this white paper to learn how to automate defense education for your users with routine campaigns, training, follow-up and reporting.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Sophos

When Software Goes Rogue
sponsored by BDNA
WHITE PAPER: How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.
Posted: 02 Jun 2017 | Published: 31 May 2017

BDNA

The Agile Security Manifesto
sponsored by Synopsys
WHITE PAPER: Find out how to achieve continuous integration/continuous deployment (CI/CD) safely and securely with the 4 principles of building app security into Agile development.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

Synopsys

Why IPS Devices and Firewalls Fail to Stop DDoS Threats
sponsored by Arbor Networks
WHITE PAPER: According to data center respondents of Arbor's Worldwide Infrastructure Security report, 67% have experienced a multi-vector DDoS attack. In addition, 45% of respondents experienced firewall or IPS device failure during an attack. This white paper reveals why IPS devices and firewalls can't stop DDoS attacks.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Arbor Networks

Safe Adoption of Cloud Applications
sponsored by Symantec
WHITE PAPER: Gartner predicts that nearly 40% of enterprise IT application spend will be shifted to cloud versus on-premise by 2020. Access this white paper for major considerations you will need to focus on when looking for cloud app security.
Posted: 26 May 2017 | Published: 26 May 2017

Symantec

Accelerating and Protecting APIs
sponsored by Akamai Technologies
WHITE PAPER: With APIs powering critical websites and apps, read this white paper to learn how you can optimize performance and address API vulnerabilities.
Posted: 02 Nov 2017 | Published: 02 Nov 2017

Akamai Technologies

Security at Scale: Logging in AWS
sponsored by Amazon Web Services
WHITE PAPER: The logging and monitoring of API calls in the AWS cloud are key components in security and operational best practices, as well as requirements for industry and regulatory compliance. This white paper explores how to achieve compliance in AWS with common logging requirements.
Posted: 09 Oct 2017 | Published: 31 Oct 2015

Amazon Web Services
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement