IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflow Reports
 
The Developer's Guide to the DevSecOps Galaxy
sponsored by Veracode, Inc.
WHITE PAPER: Bringing developers and operations staff together under the singular DevOps roof means trying to mesh contradictory approaches, leaving open security concerns. DevSecOps to the rescue! Access this white paper to learn about DevSecOps challenges, best practices, and more!
Posted: 03 May 2017 | Published: 03 May 2017

Veracode, Inc.

Focus ANZ: Security & Digital Transformation
sponsored by ComputerWeekly.com
EGUIDE: With cyber threats and attacks making headlines almost every day, cyber security has now become a key focus of many governments and enterprises all over the world. In this e-guide, read about the new measures the Australian government is putting in placeto protect critical systems from cyber attacks.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

ComputerWeekly.com

IAM Case Study: How to Maximize Your ROI and Security
sponsored by OneLogin
WHITE PAPER: Security and ROI don't have to be antagonistic. Learn how one company achieved a 482% ROI with their IAM over the course of three years, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

Secure Agile Development: Why Can't We All Get Along?
sponsored by Veracode, Inc.
WEBCAST: As developers turn to Agile methodologies to accelerate development, app security can often get left in the dust. This webcast explores strategies for increasing collaboration between development and security teams. Learn how to bring security testing up to speed to ensure software quality in Agile development environments.
Posted: 05 May 2017 | Premiered: May 5, 2017

Veracode, Inc.

How to Secure Your Organization's Data in SaaS Apps
sponsored by OneLogin
WHITE PAPER: According to Cisco, IT departments are only aware of about 7% of their company's cloud app usage, leading to a massive security blind spot. Discover 10 steps on how to track sensitive corporate data in third-party SaaS apps and ensure that only the right people have the right level of access to it.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

OneLogin

When Software Goes Rogue
sponsored by BDNA
WHITE PAPER: How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.
Posted: 02 Jun 2017 | Published: 31 May 2017

BDNA

Reduce App Risk During Mergers and Acquisitions
sponsored by Flexera Software
WHITE PAPER: With the prevalence of open source software in app code nowadays, organizations must be vigilant if they wish to mitigate the risk associated with it during a merger or acquisition. Learn how to ensure that your enterprise isn't at risk of financial and legal pitfalls during mergers and acquisitions stemming from non-compliant software code.
Posted: 06 Jul 2017 | Published: 06 Jul 2017

Flexera Software

15 Endpoint Security Suites Compared
sponsored by Symantec & Blue Coat Systems
RESEARCH CONTENT: Access Forrester's 25-criteria evaluation of endpoint security suite providers to learn market trends and uncover how 15 vendors match up.
Posted: 26 May 2017 | Published: 19 Oct 2016

Symantec & Blue Coat Systems

Maximizing IT Security with Configuration Management
sponsored by Puppet
WHITE PAPER: This white paper explores how to leverage configuration management to bolster security and meet compliance regulations. Uncover some of the key benefits, including the creation of a Standard Operating Environment (SOE), reporting on and control of configuration drift, enhanced change remediation, and more.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

Puppet

DevSecOps: Putting the Security in DevOps
sponsored by Sonatype
EGUIDE: Security in DevOps, aptly named DevSecOps, is something that your development organization is going to have to deal with soon. This e-guide is your primer to bringing these two departments together when they come from such different perspectives. Learn how to improve collaboration, incorporate security earlier in development, and more.
Posted: 08 May 2017 | Published: 04 May 2017

Sonatype
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement