IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflow Reports
Improving Web Application Firewall Security
sponsored by Akamai
WHITE PAPER: In this white paper, learn the 5 basic, yet critical, characteristics that a WAF needs to perform.View now and discover how to evaluate WAFs and go beyond the basics to defend against advanced attacks.
Posted: 04 Nov 2015 | Published: 23 Sep 2015


Integrating Testing and Service Virtualization in a WebSphere Environment
sponsored by IBM
WEBCAST: In this webinar, Nick Portalski and Stephen Rowles of Integration Testing at IBM explain how to integrate testing and server virtualization in a WebSphere environment. View now to see the four types of testing performed on load and virtualization servers as well as discover how to test apps built on WebSphere.
Posted: 22 Sep 2015 | Premiered: Sep 22, 2015


Cloud Security: Expand Your Cloud Offering and Protect Your Services
sponsored by Radware
WHITE PAPER: This white paper examines the unique security challenges CSPs are up against and how to protect your organization's infrastructure from advanced threats.
Posted: 01 Oct 2015 | Published: 05 Jan 2012


Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

How to Extend Identity Security To Your APIs
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper discusses the new authentication and authorization standards for REST APIs, how they can be composed with SAML, and details about how they work to provide IAM and API security. Continue reading to learn more.
Posted: 26 Oct 2015 | Published: 07 May 2014

Ping Identity Corporation

Cloud Security Risks Still An Issue for CIOs, but Change Is in the Air
sponsored by Oracle Corporation
EGUIDE: This e-guide discusses how cloud security risks will be less of a barrier to adoption as cloud service providers are allowing potential customers to conduct infrastructure assessments and publishing SOC reports on their security controls. Read on to learn more about how self-education and enlightened vendor response can ease your move to the cloud.
Posted: 20 Nov 2015 | Published: 20 Nov 2015

Oracle Corporation

Security and Compliance: The New Watchwords of Enterprise App Delivery
sponsored by IBM
WHITE PAPER: This white paper examines the driving forces behind the establishment of corporate application stores, and highlights one best-in-class mobile app management (MAM) program. Read on to learn how to ride the crest of this new wave of mobility and enhance your enterprise app security.
Posted: 12 Oct 2015 | Published: 12 Oct 2015


The New Cloud Security Hero
sponsored by IBM
VIDEO: The following webinar features insights from industry leaders on the latest in cloud security developments. Learn three key ways to address your cloud security issues.
Posted: 10 Nov 2015 | Premiered: 10 Nov 2015


Mobilize Your Enterprise Applications without the Hassle of Upgrading
sponsored by StarMobile
WHITE PAPER: In this white paper, you will discover how to transform your enterprise applications without costly upgrades and for use on any endpoint. Learn how to mobilize your legacy apps at a fast, simple, and economic pace, and without modifying them at the source code level.
Posted: 22 Oct 2015 | Published: 22 Oct 2015


Infographic: Application Security on Cloud
sponsored by IBM
RESOURCE: This infographic identifies an application security analyzer that can perform periodic security testing, identify high-priority vulnerabilities, and improve your overall application security program. Learn how you can secure your enterprise's application development infrastructure more effectively before applications are deployed.
Posted: 14 Oct 2015 | Published: 14 Oct 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement