IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed   
Buffer Overflow Reports
 
Transforming Network & App Security at Man Energy Solutions
sponsored by Zscaler
CASE STUDY: In this case study, discover how a major energy provider switched from a traditional castle and moat approach to a modern cloud deployment for network security. This switch helped MAN to experience benefits, including a better experience for end users, reduced attacks surface, and more.
Posted: 09 Oct 2018 | Published: 09 Oct 2018

Zscaler

Deliver Secure Software at the Speed of DevOps
sponsored by Checkmarx
WHITE PAPER: Download this white paper to learn how you can bake security into your development process from the start, easing the work for developers and eliminating the need to fight threats after the fact.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Checkmarx

Computer Weekly – 27 November 2018: Software patching at scale – how to make it work
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

ComputerWeekly.com

The State of Application Security in Today's Application Economy
sponsored by Micro Focus
WHITE PAPER: As companies become active players in the application economy, the implications of security—and the lack thereof—loom over them. Organizations that have never before given thought to security are now concerned about the risk posed by their applications. In this IDG quick poll, uncover considerations for building your application security strategy.
Posted: 16 Nov 2018 | Published: 16 Nov 2018

Micro Focus

Kubernetes Open-Source Orchestration & Security
sponsored by Aqua Security
RESOURCE: For those who use the open-source capabilities of Kubernetes security, there are 4 types of threats that you should know about. In this resource, explore a discussion of threat models, various security considerations and best practices for optimizing your Kubernetes deployment.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Aqua Security

Evolution of Product Testing: Firewall
sponsored by NSS Labs
PRODUCT REVIEW: In this firewall testing report, learn how your organization can benefit from a firewall that is as stable, as reliable, as fast, and as flexible as the network it is protecting.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

NSS Labs

Delivering Safer Apps with Docker Enterprise and Windows Server
sponsored by Docker
WHITE PAPER: Many are now housing mission-critical applications in containers to accelerate the delivery of apps and reduce their possible attack surface. In this whitepaper, find the three keys to safer apps and how a migration to containers can help accomplish all of them in your organization.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

Docker

Securing Web Applications
sponsored by Oracle Dyn
EBOOK: Attacks on web applications can circumvent your security and harm your business in myriad ways by creating unwanted downtime, reducing availability and responsiveness, and shattering trust with your customers when data confidentiality and integrity is compromised.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Oracle Dyn

Play it Safe, Secure Your Cloud Network Using These Methods
sponsored by Forcepoint
WEBCAST: Because there are no real standard practices yet, the risks presented by SaaS applications vary widely. Tune in to this webcast for the best practices to secure your cloud network.
Posted: 14 Sep 2018 | Premiered: Sep 14, 2018

Forcepoint

Machine Learning Pushes Fortiweb to the Head of the WAF Class
sponsored by Fortinet, Inc.
WHITE PAPER: Web application firewalls (WAFs) have taken center stage in enterprise security architectures due to the complexity of the threat landscape. In this white paper, discover the key features of a WAF that meets the security and operational requirements that security organizations need.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

Fortinet, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement