IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed   
Buffer Overflow Reports
 
Real-World Customer with Secure Application Infrastructure
sponsored by VMware
WHITE PAPER: In this white paper, learn about secure application infrastructure, which architects security controls directly into the networks and endpoints where applications live—enabling protection to follow apps wherever they go. Also explore features of secure application infrastructure, as well as use cases for education, healthcare and more.
Posted: 18 Jun 2019 | Published: 31 Jul 2018

VMware

Automated Security at the Speed of DevOps
sponsored by Trend Micro, Inc.
WHITE PAPER: As organizations implement DevOps on AWS, they need to understand the security implications. In this white paper, explore the main challenges businesses face at the intersection of DevOps and security. Also, learn best practices for integrating security within your development process from the start.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Trend Micro, Inc.

The Difference Between Format-Preserving Encryption and Tokenization
sponsored by Comforte AG
RESOURCE: Format-preserving encryption (FPE) and tokenization have similar objectives, but the difference between the 2 can be confusing at times. Download this resource for a brief overview of both the similarities and differences between these 2 data-centric security methods. Also, explore examples of when 1 method might be used instead of the other.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Comforte AG

In Plain Sight: The Vulnerability Epidemic in Financial Mobile Apps
sponsored by Arxan
ANALYST REPORT: This study examines the perceived security of financial mobile apps. It highlights the systemic problem across the financial services industry of FIs' failure to properly secure their mobile apps. In this research report, explore key takeaways from the study which can be used as a guide to help you secure your mobile applications.
Posted: 24 Jul 2019 | Published: 30 Apr 2019

Arxan

Cloud Access Security Broker- Market Quadrant 2018
sponsored by Forcepoint
RESEARCH CONTENT: Cloud Access Security Brokers (CASBs) serve to monitor activity and enforce security policies between cloud users and cloud applications. CASBs also give organizations visibility into authorized and non-authorized cloud applications. In this Radicati Market Quadrant, explore key CASB vendors in the market.
Posted: 14 May 2019 | Published: 31 Oct 2018

Forcepoint

Debunking No-code and Low-code Adoption Myths
sponsored by Crowd Machine
RESOURCE: The following post will set the record straight and debunk the three most common myths about no-code and low-code platforms. Read it here to separate fact from fiction and to get an objective take on what these platforms are capable of.
Posted: 12 Aug 2019 | Published: 03 May 2019

Crowd Machine

Definitive Guide to Securing DevOps
sponsored by WhiteHat Security
WHITE PAPER: Security can become a massive roadblock at the end of a development sprint, so you need to think about shifting it left in your DevOps process. What can a security shift left accomplish for you? Learn about all of the benefits in this whitepaper, and learn how to begin moving your security process today.
Posted: 14 May 2019 | Published: 14 May 2019

WhiteHat Security

AI and Its Role in Software Development
sponsored by Crowd Machine
RESOURCE: Read the following blog post to examine AI's capabilities, how AI could benefit your enterprise, and AI's future role in software development.
Posted: 13 Aug 2019 | Published: 25 Mar 2019

Crowd Machine

How to Write Secure Code in C
sponsored by Perforce
WHITE PAPER: According to the Software Engineering Institute (SEI), 90% of reported security incidents result from exploiting vulnerabilities in software code or design. Don't let simple coding errors lead to hacking threats. Take a look at this whitepaper to learn 4 ways to ensure your code is secure.
Posted: 29 Apr 2019 | Published: 29 Apr 2019

Perforce

AWS Dynamic Duo Infographic
sponsored by Symantec
RESOURCE: DevOps and InfoSec need to integrate their processes and work collaboratively to secure organizations as their reliance on public cloud infrastructure grows. Download this infographic to discover a 5-step action plan for embracing DevSecOps in your organization.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Symantec
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement