IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflows Reports
 
Application Security 101: How to Build an Effective Defense
sponsored by WhiteCryption
WHITE PAPER: This exclusive white paper dives into a solution that can ensure secure app access and keep business moving. Read on to learn more.
Posted: 24 Feb 2015 | Published: 24 Feb 2015

WhiteCryption

Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: View this white paper to learn how to close application vulnerability gaps and mitigate business risk.  Read on to learn more.
Posted: 26 Feb 2015 | Published: 15 Oct 2014

Veracode, Inc.

2015 Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This 2015 cyber risk report provides a broad view of the 2014 threat landscape and gives you the information you need to protect your business.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

Hewlett-Packard Company

Application Whitelisting: Discover the Pros and Cons
sponsored by Threat Track Security
WHITE PAPER: This webpage explores how whitelisting works and dissects its pros and cons.
Posted: 18 Feb 2015 | Published: 04 Nov 2013

Threat Track Security

Application Usage and Threat Report
sponsored by Palo Alto Networks
WHITE PAPER: This exclusive white paper offers a look at key findings with common sharing applications and why they are mostly used by hackers as a delivery system for cybercrime and theft. Read on to learn more.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Palo Alto Networks

HP Global 2000 Mobile Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
Posted: 01 Feb 2015 | Published: 18 Aug 2014

Hewlett-Packard Company

Cyber Risk Report 2015 - Executive Summary
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Cyber Risk Report 2015 provides a broad overview of the threat landscape and how hackers operate.
Posted: 05 Mar 2015 | Published: 28 Feb 2015

Hewlett-Packard Company

One Great Firewall Analyzed in Depth
sponsored by Cisco Systems, Inc.
WHITE PAPER: This detailed white paper gives you all the information you need about a firewall that's stable, reliable, and able to block over 99% of threats.
Posted: 17 Feb 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Mobile App Security: All You Need to Know
sponsored by Maas360 by IBM
WEBCAST: This webcast helps mobile application developers embed enterprise-grade security in their applications.
Posted: 25 Feb 2015 | Premiered: Feb 25, 2015

Maas360 by IBM

Closing the Hacker's Open Door: Strengthening Mobile & App Security
sponsored by IBM
WEBCAST: In this webcast, learn how to stop apps with malware signatures before they find their way onto your network.
Posted: 05 Mar 2015 | Premiered: Jan 7, 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement