IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed   
Buffer Overflow Reports
 
Securing Web Applications Building a Strategy for Defense Against Malicious Bots
sponsored by Oracle Dyn
WHITE PAPER: Attacks on web applications can circumvent your security and harm your business in myriad ways by creating unwanted downtime, reducing availability and responsiveness, and shattering trust with your customers when data confidentiality and integrity is compromised.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Oracle Dyn

Cloud migration: Choosing the right strategy and tools
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, learn how to sell the value of cloud to the C-suite, roll DevOps tools into your migration plan, and avoid access control mistakes that could lead to data breaches that have hit the headlines of late.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

ComputerWeekly.com

Getting the Most out of your AppSec Program
sponsored by WhiteHat Security
VIDEO: According to Gartner, 75% of mobile applications do not include basic security testing. This webinar offers strategic approaches for augmenting your application security program.
Posted: 23 Jan 2018 | Premiered: 23 Jan 2018

WhiteHat Security

2018 Security Predictions
sponsored by Splunk
WHITE PAPER: What will the future bring for security? This resource offers predictions for 2018, such as how machine learning and DevSecOps will impact and benefit security strategies.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Splunk

Intelligent Web Application Security
sponsored by Oracle Dyn
WHITE PAPER: Access this 11-page white paper to discover the tools and techniques you can use to execute an intelligent approach to web application security.
Posted: 04 Jun 2018 | Published: 04 Jun 2018

Oracle Dyn

Applying Secure Design Patterns to Microservices Development
sponsored by WhiteHat Security
VIDEO: From a developer's perspective, find out what you can do to improve app security for microservices-based development so that you can find and resolve issues even as you continuously release and iterate code.
Posted: 25 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

Analyzing the OWASP Top 10: Top Application Security Threats & How to Mitigate Them
sponsored by Radware
WHITE PAPER: Inside, explore an overview of changes between the 2013 and 2017 top 10 list, serving as an industry benchmark for the application security community. Uncover technical capabilities security pros should consider when evaluating web application firewalls.
Posted: 05 Jun 2018 | Published: 05 Jun 2018

Radware

Achieving a Competitive Advantage Through Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Download this resource to uncover five key takeaways from a research report showing how to make application security a competitive advantage for your organization.
Posted: 01 May 2018 | Published: 01 May 2018

Veracode, Inc.

Expanding the Threat Intelligence Horizon
sponsored by Phantom Cyber
VIDEO: How is your organization defending and responding to threats? Explore this webcast with Phantom and McAfee to uncover an automated threat hunting and response cyber defense approach, which includes a cloud assisted security strategy and integrated security strategies.
Posted: 23 Feb 2018 | Premiered: 21 Feb 2018

Phantom Cyber

4 Essential Strategies for Endpoint Security and Protection
sponsored by Absolute
WHITE PAPER: Endpoint devices are the single largest group of devices inside your network today. Disruption of endpoints can have a serious impact on your day to day business operations. This resource offers 4 essential strategies to improve your endpoint security and protection.
Posted: 30 Jan 2018 | Published: 30 Jan 2018

Absolute
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement