IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed   
Buffer Overflow Reports
 
Axis Security Video: Safely Delivering Simple, Secure and Managed 3rd Party Access
sponsored by Axis Security
VIDEO: VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.
Posted: 11 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

Protecting Against the Hidden Threats of New Technologies
sponsored by Traceable
RESOURCE: Software development is being revolutionized by tools like GraphQL, but these new technologies also bring unknown security risks with them. Read this Traceable post to learn some of the biggest challenges facing modern application security, the shortcomings of legacy security, and strategies and solutions tackling this new wave of problems.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable

Enable and Educate Your Team
sponsored by WhiteHat Security
DATA SHEET: Too many cyberattacks come from subpar employee enablement and/or security misconfigurations. WhiteHat is looking to resolve this issue with their eLearning Platform, designed to educate your users on common application security threats, best practices, incident remediation, and more – read on to learn more about the platform.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

WhiteHat Security

The Network Leader’s Guide to Secure SD-WAN
sponsored by Fortinet, Inc.
WHITE PAPER: With the rapid rise in SaaS and IaaS use, many network engineering and operations leaders are looking to replace their outdated WAN infrastructures with SD-WAN. While selecting the right SD-WAN for a particular use case may require a few compromises, security shouldn’t be one of them. Access this guide to learn about secure SD-WAN.
Posted: 29 Oct 2020 | Published: 03 Oct 2019

Fortinet, Inc.

Application Fraud: Accelerating Attacks and Compelling Investment Opportunities
sponsored by IDology
RESEARCH CONTENT: Application fraud has consistently been reported to be among the top biggest pain points for fraud executives in the financial industry with evidence that it's gotten significantly worse. That's why this Aite Impact report, in collaboration with IDology, delves into how FIs are managing this challenge today.
Posted: 04 Jun 2021 | Published: 04 Jun 2021

IDology

Tips to Follow onYour AppSec Journey
sponsored by Veracode, Inc.
RESOURCE: Best practices don’t become best practices overnight. There are first steps to take for each, not least in application security. So for processes such as testing, shifting left and vulnerability management, how can you start? Access this infographic to learn 5 AppSec best practices and 5 practical first steps to each.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

Veracode, Inc.

Get the Most Mileage Out of Your AppSec Program
sponsored by WhiteHat Security
WEBCAST: While formulating your race strategy to stay secure in 2021 and beyond, your security and development teams must be running at optimal performance to ensure vulnerabilities are identified and remediated. Join this webinar to learn how you can take your application risk management to the next level.
Posted: 17 Mar 2021 | Premiered: Mar 17, 2021

WhiteHat Security

A MAJOR ROADBLOCK TO BUSINESS INNOVATION
sponsored by Contrast Security
WHITE PAPER: When fast-moving developers encounter outdated security tools and processes, they are forced to delay releases in order to perform ineffective ceremonial exercises such as generating a scan. You need a more comprehensive and holistic approach to app security. Read this white paper to get started.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Contrast Security

Leve raging AI to Automate Vulnerability Management
sponsored by Dell SecureWorks
DATA SHEET: Today’s organizations need vulnerability management (VM) solutions that are built to maximize risk reduction. With the power of ML, these same organizations can minimize the manual burden on InfoSec and IT operations teams. Download this data sheet to explore how Secureworks’ VM solution strives to do all this and more.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Dell SecureWorks

Does your AppSec Program Get An A+?
sponsored by WhiteHat Security
WEBCAST: Applications are critical to an organization’s ability to communicate internally as well as with end-users or other third parties. As a result, apps are a quickly becoming a prime target for cybercriminals. Watch this webinar to learn more about the AppSec landscape, including what the common threats are and where pressure is rising.
Posted: 07 Dec 2020 | Premiered: Dec 7, 2020

WhiteHat Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences