IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflows Reports
 
DDoS Attacks: Q2 2016 vs. Q2 2015
sponsored by Akamai
ANALYST REPORT: This security report shows you the cybersecurity and attack trends to the end of Q2 2016, specifically in regards to DDoS and web application attacks. Discover why there's been such a dramatic increase in DDoS and web application attacks.
Posted: 27 Sep 2016 | Published: 30 Apr 2016

Akamai

Enterprise Security Gets Adaptive
sponsored by Kaspersky Lab
WHITE PAPER: This paper explores how to implement a more adaptive, integrated approach to security suited for web, mobile, cloud, and virtual environments. Uncover the 4 pillars of adaptive enterprise security that will help you defend against advanced persistent threats (APTs).
Posted: 26 Oct 2016 | Published: 31 Dec 2015

Kaspersky Lab

When "Free" is not Free: The True Costs of Open Source
sponsored by Rogue Wave Software
WEBCAST: In this webinar, director of product management and OSS expert, Richard Sherrard examines how to know exactly what packages are used in your company, specific technical, security, and licensing hurdles that many organizations face and What "free" actually means when it comes to OSS.
Posted: 28 Nov 2016 | Premiered: Oct 31, 2016

Rogue Wave Software

Are You Ready for RASP?
sponsored by SearchSecurity.com
EBOOK: This runtime application self-protection handbook covers the basics and offers advice on RASP implementation for IT security professionals.
Posted: 24 Oct 2016 | Published: 21 Oct 2016

SearchSecurity.com

Mobility Management Made Simple With IBM MaaS360
sponsored by IBM
VIDEO: In this webcast learn about a program that enables simple and intuitive application management while keeping mission-critical information safe without slowing down mobile development. Discover a software that allows for single-sign on, separates data for business security, and end-user peace of mind, and more.
Posted: 24 Oct 2016 | Premiered: 27 Apr 2016

IBM

Onapsis Research Labs: SAP Systems Security Analysis
sponsored by Onapsis
WHITE PAPER: This Onapsis Research Labs report helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.
Posted: 22 Aug 2016 | Published: 29 Feb 2016

Onapsis

Top 5 Reasons Why You Need an AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: A variety of misconceptions lead to the lag in AppSec adoption, but the reality is you need an AppSec program. Learn the top 5 reasons why in this white paper.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Veracode, Inc.

App Development Strategies fit for Governments
sponsored by Red Hat
WHITE PAPER: Application development, deployment, and ongoing management doesn't have to be difficult. Discover secure ways to implement DevOps practices using open-source tools.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Red Hat

5 Signs You Need A Mobile Security Game Plan
sponsored by Appthority
WHITE PAPER: Learn five signs that indicate you need to step up your mobile security game plan. If mobile security is your blind spot or you simply sense a breach on the horizon, the time to beef up mobile security is right now.
Posted: 05 Oct 2016 | Published: 30 Sep 2016

Appthority

IBM FlashSystem: Powering the Future of IT
sponsored by IBM
WHITE PAPER: This white paper explains how flash storage can provide the performance and security needed to run these apps and prevent data breaches. Access now and discover how flash can help 5 key drivers of info technology: cloud, data analytics, mobile and social engagement and security.
Posted: 23 Nov 2016 | Published: 30 Jan 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement