IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed   
Buffer Overflow Reports
 
5 Essential Elements of a Comprehensive Endpoint Security Strategy
sponsored by Cyber-Ark Software
WHITE PAPER: Digital transformation continues to be a top priority at organizations. However, business leaders should be aware that a critical part to the digital transformation journey is reconsidering how you monitor and protect endpoints. In this white paper, discover 5 key elements for an effective endpoint security strategy.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

Cyber-Ark Software

Using Third-Party Marketing Tools on your Website Without Compromising Security
sponsored by Tala Security
WHITE PAPER: Learn how you can protect your website from vulnerabilities caused by marketing tools and other integrations by leveraging technology native to most browsers.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Tala Security

WhiteHat Software Composition Analysis
sponsored by WhiteHat Security
WHITE PAPER: Leveraging 3rd party code is dangerous due to the unknown security risks – this makes software composition analysis an essential practice for all open source users. Open this open source briefing to review whether you should consider implementing a software composition analysis tool to safeguard your open source reliance.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

WhiteHat Security

Integrating Static Application Security Tools (SAST) In DevSecOps
sponsored by Valbrio
WHITE PAPER: Learn how the role of static application security testing tools (SAST) and GrammaTech CodeSonar can be used in DevSecOps and continuous development pipelines to improve quality and security and ultimately, make teams more competitive in getting market leading solutions out the door quicker.
Posted: 13 Mar 2020 | Published: 13 Mar 2020

Valbrio

Protect Critical SAP Transactions and Address Business Risks
sponsored by Appsian
DATA SHEET: Learn how to effectively address the risks associated with ERP business transitions using Appsian Security Platform.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Appsian

Securing APIs in the Age of Connected Experiences
sponsored by Google
EBOOK: APIs help enterprises to meet customer expectations—but the popularity of APIs has also changed both how bad actors attack and what enterprises must do to keep data safe. This eBook explores how customer expectations have necessitated that businesses apply security and protection at every point of interaction within a connected experience.
Posted: 31 Mar 2020 | Published: 31 Mar 2020

Google

The Vulnerability Epidemic in Mobile Financial Apps
sponsored by Arxan
WEBCAST: A recent study examined the protective capabilities of more than 30 different financial services applications found on the Google Play store. In this webinar, Knight and Arxan chief scientist Aaron Lint discuss the report findings and share best practices to enhance mobile app protection.
Posted: 24 Jul 2019 | Premiered: Jul 24, 2019

Arxan

Finds Cost- and Time-Savings with IdentityNow
sponsored by SailPoint Technologies
CASE STUDY: Banking is built upon the transactions it performs daily, and Orrstown Bank needed a solution that could be quickly deployed while also protecting the data and integrity of its transactions. In this case study, learn how Orrstown Bank was able to meet these needs by deploying SailPoint IdentityNow.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

SailPoint Technologies

WhiteHat eLearning Computer-Based Training
sponsored by WhiteHat Security
WHITE PAPER: Leveraging online developer trainings are a quick and effective way to resolve your security centric development hurdles. Download this whitepaper for an overview of 4 security training paths designed to enhance developer security practices.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

WhiteHat Security

Okta + MuleSoft: Comprehensive API Access Control and Management
sponsored by Okta
DATA SHEET: As the most valuable APIs often contain sensitive data, the consequences of getting API security wrong can be significant. It’s critical to implement a solution that enables secure management and access control to your APIs. Read on to learn how Okta and MuleSoft deliver comprehensive API access control and management.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info