IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed    Add to Google    Add to My Yahoo!
Buffer OverflowsReports
 
What Next Gen Firewalls Miss: 6 Requirements to Protect Web Applications
sponsored by Imperva
WHITE PAPER: Read this white paper to unveil the top 6 recommended features for Web application security that next-generation firewalls and an intrusion prevention system (IPS) often miss.
Posted: 21 Feb 2014 | Published: 31 Dec 2013

Imperva

IT Security Challenges: Interview with Brian Glick and HP
sponsored by Hewlett-Packard Limited
WEBCAST: In this webcast, learn how to deal with security threats proactively and better understand the importance of becoming familiar with your IT's own vulnerabilities in infrastructure and applications so you're able to monitor and manage security optimally.
Posted: 07 Feb 2014 | Premiered: Feb 7, 2014

Hewlett-Packard Limited

Secure The Enterprise With Confidence Using A Mainframe Infrastructure
sponsored by IBM
WHITE PAPER: Business leaders around the world are increasingly concerned about the protection of intellectual property. In this informative Forrester report, view the results of a survey of 225 IT security leaders about their investments in information security.
Posted: 14 Nov 2013 | Published: 31 Mar 2013

IBM

A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 06 Nov 2013 | Published: 30 Sep 2012

IBM

Software Security for Web Developers: Providing a Helping Hand
sponsored by Imperva
EGUIDE: This expert e-guide from SearchSecurity.com sheds light on how fostering harmony between security and software development teams can ensure application protection early on.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

Imperva

Social Media Governance & Security: Amplify Your Brand While Protecting Your Assets
sponsored by Hootsuite
WEBCAST: Social media is drastically altering the way businesses interact with clients, and while it provides great opportunity to increase brand awareness, it also brings significant risk. Choosing the right social media platform is paramount to ensuring security and maintaining compliance.
Posted: 21 Nov 2013 | Premiered: Nov 21, 2013

Hootsuite

Protecting Your APIs Against Attack & Hijack
sponsored by CA Technologies.
WHITE PAPER: Even though application programming interfaces (APIs) experience the same threats as the Web, thanks to architecture differences, existing Web security methods aren't enough to keep them protected. Read on to unveil 5 best practices to secure your API architectures.
Posted: 06 Feb 2014 | Published: 31 Dec 2012

CA Technologies.

Course: Exposure of System Data to an Unauthorized Control Sphere (CWE-497)
sponsored by Klocwork
WEBCAST: Access this resource for an overview of an online course on CWE-497, which discusses the weaknesses caused by exposure of system data to an unauthorized control sphere. Learn the security impact of this weakness with examples of code to demonstrate the danger to your application security.
Posted: 08 Nov 2013 | Premiered: Nov 8, 2013

Klocwork

Securing Enterprise Applications
sponsored by IBM and Juniper
WHITE PAPER: This informative resource discusses a comprehensive set of application security solutions that provide highly effective security services for applications on your network, mobile devices, and even in the cloud.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

IBM and Juniper

Next-Generation Security for Today's Data Center
sponsored by IBM and Juniper
WHITE PAPER: This crucial resource discusses next-generation security solutions that can offer unparalleled protection against data exfiltration, website outages, and other serious threats against the data center.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

IBM and Juniper
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement