IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflows Reports
 
Don’t Let Security Technology Put the Brakes on DevOps
sponsored by CloudPassage
WHITE PAPER: This white paper explains how a cloud-based security and compliance platform can help you maintain strong security without sacrificing DevOps productivity.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

CloudPassage

Five Simple Strategies for Securing APIs
sponsored by CA Technologies.
EBOOK: This guide provides an overview of the unique risk profile of APIs and offers 5 simple solutions to counter common threats to their security.
Posted: 11 Jun 2015 | Published: 11 Jun 2015

CA Technologies.

Examining the Current Cyber Risks
sponsored by Hewlett-Packard Company
WHITE PAPER: With attacks no longer a question of "if" but "when," it's crucial to know what your enemies are up to. This white paper examines the prevalent vulnerabilities in organizations today, how hackers are exploiting them, and which tools they are using to get the job done.
Posted: 28 Apr 2015 | Published: 28 Feb 2015

Hewlett-Packard Company

10 New Rules for Mobile Strategy and Success
sponsored by Kony
WHITE PAPER: In this white paper, discover ten essential tips for creating an innovative, impactful mobile strategy.
Posted: 29 Apr 2015 | Published: 29 Apr 2015

Kony

Securing the Mobile-First Experience
sponsored by HID
RESOURCE: This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.
Posted: 26 May 2015 | Published: 01 Apr 2015

HID

Combating Android app repackaging attacks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how apps repackaged through reverse engineering pose a big security risk to the Android smartphone operating system.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ComputerWeekly.com

HP Global 2000 Mobile Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
Posted: 01 Feb 2015 | Published: 18 Aug 2014

Hewlett-Packard Company

Enterprise Mobility Strategies: Steps to Success
sponsored by Data#3
WEBCAST: With the expansion of your mobile enterprise, it is ever-important to have mobility management solutions that support flexible work practices and enhance user experience. This webcast provides a framework for developing and implementing a successful enterprise mobility strategy.
Posted: 30 Jul 2015 | Premiered: Jul 30, 2015

Data#3

MDM Best Practices: Proactive Application Security
sponsored by IBM
WHITE PAPER: Ensuring mobile security now goes beyond MDM and MAM to mobile application lifecycle management (MALM). This white paper reviews MALM best practices for organizations with bring your own device (BYOD) policies.
Posted: 06 Jul 2015 | Published: 26 Dec 2014

IBM

Mobile App Security: All You Need to Know
sponsored by Maas360 by IBM
WEBCAST: This webcast helps mobile application developers embed enterprise-grade security in their applications.
Posted: 25 Feb 2015 | Premiered: Feb 25, 2015

Maas360 by IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement