IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed   
Buffer Overflow Reports
 
Executing on NIST SP 800-190
sponsored by Twistlock, Inc.
WHITE PAPER: When apps scale out, the old method of manually creating and maintaining security rules becomes impractical. Together The National Institutue of Standards and Technology (NIST) and Twistlock secure container environments at scale and enforce policies to secure container workloads across the environment.
Posted: 08 Aug 2018 | Published: 08 Aug 2018


Understanding API Security
sponsored by Oracle Dyn
RESOURCE CENTER: As an IT security professional, how do you go about reducing risk and increasing protection for your organization? Dive into this article for some of the most frequently asked questions about API security.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

Oracle Dyn

Moving Beyond Perimeter Security: A Comprehensive and Achievable Guide to Less Risk
sponsored by Akamai Technologies
WHITE PAPER: A zero trust security and access model is the solution: Every machine, user, and server should be untrusted until proven otherwise. But how do you achieve zero trust? Read this white paper to learn how to transition to a perimeter-less world in an incredibly easy way.
Posted: 21 Jun 2018 | Published: 30 Mar 2018

Akamai Technologies

CISO Panel Webinar: Reducing the Cyber Exposure Gap from Cloud to Containers
sponsored by Tenable
WEBCAST: Tune into this webinar as 5 different CISOs and executives give their point of view on how to minimize your attack surface, expand visibility of assets beyond the perimeter, and enhance your security practices.
Posted: 10 Aug 2018 | Premiered: Mar 15, 2018

Tenable

Traditional Workspaces vs. Secure Digital Workspaces
sponsored by Citrix
RESOURCE: Download this infographic to learn why secure digital workspaces are the way of the future and discover the management, productivity and security benefits that ensue.
Posted: 05 Sep 2018 | Published: 05 Sep 2018

Citrix

Leveraging the Benefits of Cloud Web Application Security
sponsored by Oracle Dyn
RESOURCE CENTER: This custom article examines the recent advances in web app security and explores how you can leverage cloud-based technologies to mitigate the risk to your company's critical assets.
Posted: 14 Sep 2018 | Published: 14 Sep 2018

Oracle Dyn

Fraud: It's Not Just for Banks Anymore
sponsored by F5 Networks
RESOURCE: Download this resource to learn why using a web application firewall (WAF), with full-proxy capabilities, can be your best defense mechanism against fraudsters.
Posted: 21 Sep 2018 | Published: 31 Dec 2017

F5 Networks

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

Veracode, Inc.

Keeping Your Application Fleet Flying Risk Free
sponsored by Flexera Software
WHITE PAPER: Just like sending an airplane out for take-off without any preemptive maintenance checks, deploying applications without vulnerability scans poses a major risk for your organization. Download this whitepaper to learn how your organization can mitigate application risks and stay secure.
Posted: 06 Sep 2018 | Published: 06 Sep 2018

Flexera Software

How We Build Risk Into Applications
sponsored by Veracode, Inc.
RESOURCE: There are a number of ways you could be building risks into your applications from design to production. Download this infographic to find out how to avoid building risks into your apps in 3 steps.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement