IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflow Reports
 
Evaluating the Top Application Security Testing Vendors
sponsored by Veracode, Inc.
RESOURCE: This Gartner report focuses on top AST vendors' SAST, DAST and IAST offerings, maturity and features as tools or as a service. Learn all you need to know about top vendors' AST offerings to ensure you're picking the right tool for your business.
Posted: 10 Mar 2017 | Published: 28 Feb 2017

Veracode, Inc.

Manage Risk by Protecting Apps, Data and Usage
sponsored by Citrix
WHITE PAPER: When it comes to securing vulnerabilities, especially in apps, there are 5 best practices you can follow. This white paper provides and overview of how to ensure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Citrix

Cost-Efficient, Full Lifecycle App Security Tools
sponsored by Hewlett Packard Enterprise
VIDEO: Watch this brief video to learn about a best-in-class tool that drives down into an app's code and pinpoints its potential vulnerabilities quickly and efficiently in order to enable truly secure app development.
Posted: 10 Mar 2017 | Premiered: 02 Dec 2016

Hewlett Packard Enterprise

The Internet of Things: Posing Security Threats and Delivering Beyond Expectations
sponsored by Hewlett Packard Enterprise
RESEARCH CONTENT: Not only are many early adopters struggling to secure IoT devices and apps, but many organizations disagree on what IoT means and how to extract value from it. Discover how different industries define, use, and benefit from IoT by creating "smart workplaces," increasing innovation, enhancing customer experiences, and more.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

Hewlett Packard Enterprise

Run Skype for Business as a Secure Virtual App with a Great User Experience
sponsored by Citrix
WHITE PAPER: Discover how to deliver secure, high-performance UC&C for your organization by virtualizing Skype for Business with the method illustrated. Read on to learn how this app virtualization will improve security and manageability of Skype, as well as how to evade the potential pitfalls traditional virtualization methods incur.
Posted: 25 Jan 2017 | Published: 31 Dec 2016

Citrix

Array Networks Virtual Load Balancer Case Study: County of Maui
sponsored by Array Networks
CASE STUDY: The County of Maui needed to grant users access to consolidated geographical information, without disruptive downtime or bogged-down application throughput. Download this case study to find out how they updated and centralized their GIS, gaining flexible, versatile and easy-to-use load balancers that will serve their needs now and in the future.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Array Networks

IT Project ASEAN: App Development
sponsored by ComputerWeekly.com
EGUIDE: In this guide, we show you some of the technologies helping businesses to release and deploy new applications as swiftly as possible, without disrupting business operations. From containers to microservices and DevOps, many organizations are now embracing these flexible and agile approaches.
Posted: 13 Feb 2017 | Published: 13 Feb 2017

ComputerWeekly.com

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

QRAT Malware-As-A-Service
sponsored by Booz Allen Hamilton
WHITE PAPER: QRAT, a new remote access tool, first emerged in 2015 and is now targeting U.S. visa applicants via Skype's messenger service. Discover why QRAT is dangerous and how it can infect your system within this valuable white paper. Learn who's behind the QRAT tool, where it originated and why it may be targeting you right now.
Posted: 24 Oct 2016 | Published: 30 Jun 2016

Booz Allen Hamilton

Trends in SAP Cybersecurity
sponsored by IBM
WHITE PAPER: The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 29 Aug 2016 | Published: 01 Feb 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement