IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed   
Buffer Overflow Reports
 
New Research Reveals Key Strategy to Manage Open Source Security
sponsored by WhiteSource
WEBCAST: Open source is a dominant factor in the evolution of technology and technology is now highly dependent on open source software (OSS). Although, OSS is not without risks. Listen as Scott Crawford from 451 Research discusses the rise of OSS, security composition analysis and ways to handle security vulnerabilities.
Posted: 09 Jan 2019 | Premiered: Nov 20, 2018

TOPICS: 
WhiteSource

Network Virtualization's Hidden Gem: Application Security
sponsored by VMware and Arrow
WHITE PAPER: Who should be looking at network virtualization as a source of application infrastructure security? Surprisingly—almost every enterprise. Find out more about how network virtualization can provide a holistic view of what's happening to your data, and potential threats in this white paper.
Posted: 29 Jan 2019 | Published: 29 Jan 2019

TOPICS: 

Duo: Most Loved Security Company Chooses Most Trusted Web Defense
sponsored by Signal Sciences
CASE STUDY: Learn how this leading security company achieved immediate security visibility and blocking, without impacting their user experience.
Posted: 16 Oct 2018 | Published: 16 Oct 2018

TOPICS: 
Signal Sciences

Operating Kubernetes Clusters and Applications Safely
sponsored by Aqua Security
WHITE PAPER: Keep your organization free of container and Kubernetes threats before they're able to hit you. Download this 85-page whitepaper on container and Kubernetes security to learn what changes you can make today to keep your data safe.
Posted: 17 Jan 2019 | Published: 31 Oct 2018

TOPICS: 
Aqua Security

Build a Strategic Approach to Network and App Security
sponsored by Citrix
RESOURCE: Learn how your organization can securely deliver the apps and data your teams need to be productive.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

TOPICS: 
Citrix

Adobe Creative Cloud for enterprise security overview
sponsored by Adobe Inc
WHITE PAPER: Download this white paper to learn about the security features integrated into Adobe Creative Cloud, such as access control, encryption, identity management and much more.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

TOPICS: 
Adobe Inc

Resolving the Agile vs. Secure Application Networking Tradeoff
sponsored by NetFoundry
WHITE PAPER: Read this white paper to learn about a new networking platform designed to enable secure and reliable connect applications without the constraints of VPNs, custom hardware and private circuits.
Posted: 25 Jan 2019 | Published: 25 Jan 2019

TOPICS: 
NetFoundry

Trends in the Cost of Web Application & Denial of Service Attacks
sponsored by Akamai Technologies
RESOURCE: Ponemon Institute conducted a study to understand changes in the cost and consequences of web application and denial of service attacks. The report is divided into two sections. The first section addresses web application security and the second focuses on DoS attacks. Read this report to find key takeaways to help your organization.
Posted: 19 Dec 2018 | Published: 30 Jun 2018

TOPICS: 
Akamai Technologies

Container and Kubernetes Security: An Evaluation Guide
sponsored by StackRox
WHITE PAPER: Read this container security whitepaper to learn how to get your container security strategy up to par with modern needs, and confidently build, deploy, and run your most sensitive data across containerized apps.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

TOPICS: 
StackRox

Keeping Your Application Fleet Flying Risk Free
sponsored by Flexera Software
WHITE PAPER: Just like sending an airplane out for take-off without any preemptive maintenance checks, deploying applications without vulnerability scans poses a major risk for your organization. Download this whitepaper to learn how your organization can mitigate application risks and stay secure.
Posted: 06 Sep 2018 | Published: 06 Sep 2018

TOPICS: 
Flexera Software
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement