IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflows Reports
 
Spoofing Server-Server Communication: How You Can Prevent It
sponsored by Symantec Corporation
WHITE PAPER: In this must-read white paper, you'll learn how to prevent the new SSL Strip threat that could compromise your secure applications.
Posted: 19 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

Best Practices for Selecting a Web Application Scanning (WAS) Solution
sponsored by Qualys
WHITE PAPER: This white paper explains how a Web Application Scanning solution can help you to locate and test web-based apps, and provides a checklist of best practices that will help you to understand what to look for when selecting a WAS solution.
Posted: 23 Jan 2015 | Published: 16 May 2013

Qualys

Demo: Full Server Replication Protection
sponsored by Vision Solutions
WEBCAST: Watch this brief webcast for a live demo of a program designed to make your replication process easy, efficient and, most of all, secure.
Posted: 26 Mar 2015 | Premiered: Oct 31, 2013

Vision Solutions

When Business is the App, The App is the Business. Volume 2
sponsored by Maas360 by IBM
WHITE PAPER: Click through to explore how building an effective strategy is key to ensuring that apps truly benefit the business while keeping corporate data and your network secure. Learn how a successful approach to appification should involve discovery, scalability, sustainability and, of course, security.
Posted: 07 Mar 2015 | Published: 07 Mar 2015

Maas360 by IBM

The Truth About Cloud Security Threats
sponsored by Alert Logic
WHITE PAPER: Download this white paper to discover what types of threats are growing, how often they attack, and what you can do to better secure your organization.
Posted: 16 Mar 2015 | Published: 31 May 2014

Alert Logic

How to Bolster Office 365's Built-In Security Functionality
sponsored by BitGlass
WHITE PAPER: This white paper explains how you can bolster Office 365's built-in security functionality with a comprehensive, in-house security plan, and lists the key areas that your enterprise has to address.
Posted: 04 Feb 2015 | Published: 31 Dec 2014

BitGlass

Detecting Mobile App Security Gaps
sponsored by IBM
PRODUCT DEMO: Access this resource today for your free download of IBM's Security AppScan Mobile Analyzer to detect any gaps in your app mobile app security.
Posted: 24 Feb 2015 | Premiered: 04 Feb 2015

IBM

The Evolution of Enterprise Application Security
sponsored by Prevoty
WHITE PAPER: This white paper examines the emergence of application self-protection technologies and why WAFs can't offer true app security despite common perception.
Posted: 13 Apr 2015 | Published: 14 Jan 2015

Prevoty

Mobile Security by Design: Reducing risk with an integrated approach
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, find tips and tricks for mobile security and mobile management planning.
Posted: 13 Apr 2015 | Published: 31 Dec 2014

Hewlett-Packard Limited

Huge Healthcare Data Breaches: How to Halt the Hacking Proactively
sponsored by Certes Networks
VIDEO: This short video introduces a potential safeguard for sensitive healthcare data being used in network applications: A secure virtual overlay of data traffic that follows users regardless of the devices they use or the networks they access.
Posted: 12 Feb 2015 | Premiered: 12 Feb 2015

Certes Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement