IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed   
Buffer Overflow Reports
 
Develop Smarter, Not Harder
sponsored by Sonatype
EBOOK: Download this demo book to learn about the benefits of using Sonatype's open source tools.
Posted: 04 Jun 2021 | Published: 04 Jun 2021

Sonatype

Endpoint Defense: Security Controls to Consider Now
sponsored by TechTarget
RESOURCE: The total cost of a successful attack is over $5 million, according to Ponemon Institute's 2017 State of Endpoint Security Risk Report. Simply complete our Endpoint Security Survey to access our complimentary expert guide, Endpoint Defense: Security Controls to Consider Now.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget

A Better Way to Secure Your Apps and APIs
sponsored by Traceable
VIDEO: Get an introduction to Traceable's application security platform for cloud-native applications and APIs. In this video, you’ll learn about the application security market from the perspectives of Greg Phillips, Traceable customer and CTO at Houwzer and Traceable advisors Andreas Wuchner (Credit Suisse) and Martin Rues (Outreach Corporation).
Posted: 17 Feb 2021 | Premiered: 17 Feb 2021

Traceable

VMs vs. containers: Which is better for security?
sponsored by ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 12 Mar 2020 | Published: 12 Mar 2020

ComputerWeekly.com

Get the Most Mileage Out of Your AppSec Program
sponsored by WhiteHat Security
WEBCAST: While formulating your race strategy to stay secure in 2021 and beyond, your security and development teams must be running at optimal performance to ensure vulnerabilities are identified and remediated. Join this webinar to learn how you can take your application risk management to the next level.
Posted: 17 Mar 2021 | Premiered: Mar 17, 2021

WhiteHat Security

Automation's Rising Tide: How to Manage Bots in Today's World
sponsored by F5 Networks
RESOURCE: Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

F5 Networks

WhiteHat Pen Test Service
sponsored by WhiteHat Security
DATA SHEET: In this guide, learn how to maximize your application security with automated and continuous web application scanning plus periodic pen testing to find and fix crucial vulnerabilities faster. This advanced approach will significantly reduce the risk of data breaches and other cybersecurity incidents. Get the details first-hand here.
Posted: 13 Nov 2020 | Published: 13 Nov 2020

WhiteHat Security

Understanding Your Open Source Risk
sponsored by Veracode, Inc.
EBOOK: Developers are being asked to push out more software — and in shorter periods of time — than ever before. This has led to an increased reliance on open source libraries, and as this code is reused, it comes with a high risk of vulnerability. Access this e-book to learn more about the risks of open source and the challenges in securing it.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Veracode, Inc.

Axis Security Video 1
sponsored by Axis Security
VIDEO: Your private business apps are the beating heart of your organization, but there’s a huge disconnect between these private apps and the people who need to use them. As a result, third-party contractors, employees and others experience delays or are shut out altogether. View this short video to learn about a new approach to private app access.
Posted: 07 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

Webinar - Defend better and respond faster with security that works together
sponsored by Cisco Umbrella
WEBCAST: Most malware infections happen in one of only 3 ways, so why aren’t they easier to stop? As organizations embrace the cloud, it’s now imperative to find a new approach to securing users and devices. View this webinar to find out how to stop attacks before they start and how to safeguard your organization with a layered approach to cybersecurity.
Posted: 31 Jul 2020 | Premiered: Jul 14, 2020

Cisco Umbrella
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences