IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed   
Buffer Overflow White Papers (View All Report Types)
 
Everything You Need to Know About Getting Application Security Buy-in
sponsored by Veracode, Inc.
WHITE PAPER: Application security impacts multiple groups across the entire organization. Read this paper to learn everything you need to know about getting these groups to buy-in on application security.
Posted: 02 Aug 2018 | Published: 02 Feb 2018

Veracode, Inc.

Build Application Security into the Entire SDLC
sponsored by Micro Focus
WHITE PAPER: 84% of security breaches exploit vulnerabilities at the application layer. And, software security is still an afterthought for developers. In this white paper, discover how Fortify Security Assistant empowers developers to take responsibility for their own code by finding and fixing application security defects during the coding process.
Posted: 29 Jan 2019 | Published: 31 Aug 2018

Micro Focus

Application Security and How to Improve it
sponsored by WhiteHat Security
WHITE PAPER: UBM conducted an online survey to explore common trends and challenges in app security, and to understand how security and development teams can work together to close these gaps. Click here for an inside look at the survey results.
Posted: 06 Mar 2019 | Published: 31 Dec 2018

WhiteHat Security

Container Security: 10 Things DevOps Need to Do
sponsored by Aqua Security
WHITE PAPER: In this resource, find out the ten key things DevOps should keep in mind when developing and securing containerized applications to minimize the risk posed by loose vulnerabilities.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Aqua Security

The StackRox Container Security Platform
sponsored by StackRox
WHITE PAPER: In this data sheet find out how a container security platform can reduce security risks to your containerized, cloud-native applications during the build, deploy, and run phases.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

StackRox

Next-Gen Application Security
sponsored by HackerOne
WHITE PAPER: How do you get started with bug bounties and where do they fit in a DevOps workflow? Download this paper to find out.
Posted: 05 Mar 2019 | Published: 05 Mar 2019

HackerOne

Don't Invite Bad Code In
sponsored by Veracode, Inc.
WHITE PAPER: Download this white paper to discover a software composition analysis technology that checks your third-party code at the same time you're scanning your own code, giving you complete visibility into your applications' security, in a single report.
Posted: 02 May 2018 | Published: 02 May 2018

Veracode, Inc.

Container and Kubernetes Security: An Evaluation Guide
sponsored by StackRox
WHITE PAPER: Read this container security whitepaper to learn how to get your container security strategy up to par with modern needs, and confidently build, deploy, and run your most sensitive data across containerized apps.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

StackRox

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement