Buffer Overflow Reports

12 API security best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
Posted: 14 Feb 2023 | Published: 14 Feb 2023

TechTarget ComputerWeekly.com

How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020

Veracode, Inc.

Infographic: Vulnerability management vs. Patch management
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Although both patch and vulnerability management are intertwined, they differ in critical ways, and it's important to have tools and processes for executing both. Here's a deep dive into their differences, the important places they overlap and software options for automating them.
Posted: 01 Jul 2022 | Published: 01 Jul 2022

TechTarget ComputerWeekly.com

Top DevSecOps certifications for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Check out some of the top DevSecOps certifications and trainings that can help professionals learn how to shift security left in the software development lifecycle.
Posted: 25 May 2022 | Published: 25 May 2022

TechTarget ComputerWeekly.com

Securing your software supply chain
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Organisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.
Posted: 15 May 2023 | Published: 15 May 2023

TechTarget ComputerWeekly.com

CIO Trends #11: Benelux
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Netherlands is a nation leading the world in terms of digital, so it is to be expected that bit also leads the works in securing digital assets. In this e-guide read about a report that has damning conclusions on the IT security of some of the airport's core systems.
Posted: 08 Feb 2021 | Published: 02 Jul 2020

TechTarget ComputerWeekly.com

5 Steps toward Disaster Preparedness
sponsored by Cisco Systems, Inc.
WHITE PAPER: For small and medium-sized businesses (SMBs), the impacts of a disaster can result in loss of or lack of access to data, applications, and work facilities. This paper explains five key steps to consider when implementing a program for your company.
Posted: 25 Sep 2008 | Published: 25 Sep 2008

Cisco Systems, Inc.

SeatonCorp Delivers Low Cost, High Reliability Virtual Desktops via Quest vWorkspace
sponsored by Dell Software
WHITE PAPER: Read this case study to see how the benefits of Quest® Software's vWorkspace helped SeatonCorp achieve lower cost, enhanced capabilities, higher reliability, easier management and easier end-user IT support.
Posted: 29 Jun 2009 | Published: 26 Jun 2009

Dell Software

Best Practices for Protecting Microsoft Exchange
sponsored by Symantec Corporation
WEBCAST: The right data management solution can offer the right tools to help manage your applications in an efficient manner. This webcast offers best practices and solutions that bring the peace of mind that data is protected and readily recoverable.
Posted: 17 May 2006 | Premiered: Mar 23, 2006

Symantec Corporation

Quest Software Finds Increased Security, Disaster Preparedness, and Cost Savings through Virtual Desktop Infrastructure
sponsored by Dell Software
CASE STUDY: After evaluating a number of VDI solutions, Quest was most impressed with vWorkspace, one of its own applications that had been integrated into its product portfolio from its 2007 acquisition of Provision Networks. This case study will show how using VDI resulted in significant time and cost savings for Quest.
Posted: 29 Jun 2009 | Published: 26 Jun 2009

Dell Software