IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed   
Buffer Overflows White Papers (View All Report Types)
Security for your Cloud-based Web Applications
sponsored by Alert Logic
WHITE PAPER: This Aberdeen Research paper explores the complexity and change in security of cloud-based Web applications and how a "stacked" security approach can prevent DDoS attacks.
Posted: 11 Sep 2017 | Published: 30 Apr 2017

Alert Logic

2018 Security Predictions
sponsored by Splunk
WHITE PAPER: What will the future bring for security? This resource offers predictions for 2018, such as how machine learning and DevSecOps will impact and benefit security strategies.
Posted: 08 Feb 2018 | Published: 08 Feb 2018


A WhiteHat Sentinel Product Family Overview
sponsored by WhiteHat Security
WHITE PAPER: In this white paper learn how WhiteHat Sentinel, a SaaS product suite combines application scanning with one of the world's largest threat research team to provide you with 3 different types of analysis to ensure your apps are safe, no matter where they live.
Posted: 19 Jan 2018 | Published: 30 Dec 2016

WhiteHat Security

Deploying Your API Infrastructure: Cloud, On-Premises or Both?
sponsored by CA Technologies
WHITE PAPER: Find out how to approach API management from a usage model perspective, and learn about an end-to-end API management platform that offers secure cloud, on-premise, and hybrid deployment options.
Posted: 08 Dec 2017 | Published: 31 Dec 2016

CA Technologies

6 Things That Will Accelerate Enterprise Mobility Security Adoption
sponsored by SyncDog
WHITE PAPER: According to a recent Gartner press release, 75% of mobile applications do not include basic security testing. Are you equipped to handle a massive cybersecurity breach from mobile device vulnerability? Security experts believe the marketplace isn't prepared.
Posted: 02 Oct 2017 | Published: 02 Oct 2017


ActivID Authentication Appliance for Enterprise
sponsored by HID Global
WHITE PAPER: While it's a necessity to provide employees, contractors, partners, and customers anytime, anywhere access to appropriate resources, it's also imperative that enterprises are able to maintain their security. Take a look at this white paper to reveal an authentication platform that can help you deliver access to the right users at the right time.
Posted: 21 Sep 2017 | Published: 21 Sep 2017

HID Global

Your Guide to HIPAA Compliance for Containers
sponsored by Twistlock, Inc.
WHITE PAPER: With the advent of microservices it is likely that many new healthcare apps are being built with containers. Discover how to achieve compliance with the HIPAA Security Rule for containerized workloads for healthcare apps.
Posted: 20 Jul 2017 | Published: 20 Jul 2017

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Symantec
WHITE PAPER: Cloud apps introduce a new threat vector, with lots of credentials floating around that provide direct access to business critical data. This white paper provides planning strategies for adopting cloud apps as well as information on managing the human factor.
Posted: 13 Oct 2017 | Published: 13 Oct 2017


Getting the Board on Board with Application Security
sponsored by WhiteHat Security
WHITE PAPER: CISOs need to make sure their business considers AppSec from the highest levels. Review these 4 recommendations to improve your business' AppSec and get the support you need.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

WhiteHat Security

Solution Brief - Securing the mobile enterprise
sponsored by IBM
WHITE PAPER: Discover a comprehensive portfolio of mobile security systems that address four key mobile security challenges: protecting devices, securing content and collaboration, safeguarding applications and data, and managing access and fraud. The portfolio also includes a layer of security intelligence for advanced threat detection.
Posted: 08 Mar 2017 | Published: 06 Mar 2017


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement