IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed   
Buffer Overflow Reports
 
2020: The State of Endpoint Resilience Report
sponsored by Absolute Software Corporation
ANALYST REPORT: In this research report, 2020: The State of Endpoint Resilience Report, explore insights designed to help enterprises strengthen their security posture, and build the resilience needed to continue to face today’s cyber challenges head on.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Absolute Software Corporation

Sentinel Auto API
sponsored by WhiteHat Security
DATA SHEET: Traditional API testing is manual, time-consuming, and widely unpopular. In fact, less than 25% of organizations are testing their APIs. However, the critical nature of APIs requires them to be protected. In this data sheet, take a closer look at the key features of Sentinel Auto API and see if it meets for your API security needs.
Posted: 16 Apr 2020 | Published: 16 Apr 2020

WhiteHat Security

Automation's Rising Tide: How to Manage Bots in Today's World
sponsored by F5 Networks
RESOURCE: Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

F5 Networks

Smooth the Transition to the Cloud with Radware’s Secure ADC Solutions
sponsored by Radware
DATA SHEET: Many enterprises are transitioning to the cloud. As a result, their focus shifts from infrastructure-centric environments to application-centric solutions. This creates the unique challenge of how to make advanced services, such as application delivery and security simpler to consume and maintain. In this brief, learn how Radware’s ADC can help.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Radware

Contrast Assess Route Intelligence
sponsored by Contrast Security
DATA SHEET: Learn how Contrast Assess Route Intelligence transforms AppSec by observing the routes of an application while it’s running—thereby exposing all the different points of entry into the application.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

Contrast Security

How To Integrate Security In Your DevOps Environment
sponsored by F5 Networks
EGUIDE: Application security has two challenges: Keeping pace with the evolution and sophistication of attacks, and keeping pace with the speed of modern application development...DevOps.
Posted: 29 Apr 2020 | Published: 28 Apr 2020

F5 Networks

Secure, Cloud-Controlled Network to Enable Work From Home
sponsored by CradlePoint
WHITE PAPER: When organizations plan for employees to work remote, they must consider both security and bandwidth, and uncover ways for these two to be compromised or effortlessly seamed together. Which route does your department choose to go? Do you have plans for edge computing? Browse this solution brief to learn more about modernizing your network.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

CradlePoint

The Maturity of Zero Trust in Europe
sponsored by Okta
RESOURCE: While only 18% of organizations in Europe have a defined strategy along Zero Trust principles, 93% of European organizations polled had implemented at least one security solution that mapped to a Zero Trust strategy. How does your organization compare regarding Zero Trust? View this infographic to learn how Europe is enhancing security.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Okta

Red Hat and Synopsis Podcast
sponsored by Red Hat Synopsys
PODCAST: Learn how to safeguard against poor security at every level and layer of your cloud-native environment in this podcast, which features insight from TechTarget, Red Hat, and Synopsis experts.
Posted: 22 Jul 2020 | Premiered: Jul 22, 2020

Red Hat Synopsys

The Benefits of a Software Defined Secure Branch with Versa Networks
sponsored by Verizon
WHITE PAPER: Branch or remote office network architectures have barely changed for more than 15 years, but what is required of them has significantly evolved. Today’s digital enterprises require a network landscape that is agile, intelligent, secure and reduces operational complexity while being cost-effective. This white paper reveals what you may be missing.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Verizon
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info