IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed    Add to Google    Add to My Yahoo!
Buffer Overflows Reports
Cloud Travels at the Speed of Your Business
sponsored by IBM
WEBCAST: In this webcast, you will learn about a cloud service platform that will grant cloud visibility to all your organization's enterprise mobile devices. Click here to get the answers to your cloud conundrums, including a service that boasts centrally managed security policies.
Posted: 10 Aug 2015 | Premiered: Aug 10, 2015


Securing Apps from the First Line of Code
sponsored by WhiteHat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 01 Oct 2015 | Published: 28 Oct 2014

WhiteHat Security

Enterprise Mobility Best Practices: MDM, Containerization or Both?
sponsored by VMware
WHITE PAPER: In this white paper, you will learn why both MDM and application-level management are still relevant for device deployments, providing additional functionality and security.
Posted: 18 Sep 2015 | Published: 18 Sep 2015


Top 5 Cloud Data Protection Challenges. Solved.
sponsored by Commvault
WHITE PAPER: This white paper serves as guide with which you can realize the full potential of your next cloud project. Read on to see how the following 5 challenges may impact your cloud integration strategy.
Posted: 24 Aug 2015 | Published: 24 Aug 2015


Don’t Let Security Technology Put the Brakes on DevOps
sponsored by CloudPassage
WHITE PAPER: This white paper explains how a cloud-based security and compliance platform can help you maintain strong security without sacrificing DevOps productivity.
Posted: 15 Jul 2015 | Published: 15 Jul 2015


Bolster Your Web Application Security
sponsored by WhiteHat Security
WHITE PAPER: This white paper outlines how you can give your web applications the security they need, and protect against vulnerabilities or other threats.
Posted: 01 Oct 2015 | Published: 06 Jul 2015

WhiteHat Security

App Refactoring Update: Who's New to the Landscape?
sponsored by StarMobile
WHITE PAPER: In this e-guide, Gabe Knuth surveys the current app refactoring market, and examines how one company figures into the big picture. Click here to read on about app refactoring services today.
Posted: 12 Aug 2015 | Published: 12 Aug 2015


Expert Tips to Keep Your Mobile App Secure
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how enterprises can address the security problems in their app development.
Posted: 12 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

Protecting Your Data in Office 365
sponsored by Elastica
WEBCAST: This webcast examines Shadow Data and the security vulnerabilities it opens for IT
Posted: 08 Sep 2015 | Premiered: Aug 12, 2015


Securing Office 365 and Exchange Hybrid Environments
sponsored by Elastica
EGUIDE: In this expert e-guide, you'll learn the 6 important factors to consider for a hybrid Exchange and Office 365 environment. View now to learn the pros and cons of Microsoft's cloud-based productivity suite.
Posted: 16 Sep 2015 | Published: 02 Sep 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement