IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed   
Buffer Overflow Reports
 
HOW MANUAL APPLICATION VULNERABILITY MANAGEMENT DELAYS INNOVATION AND INCREASES BUSINESS RISK
sponsored by Contrast Security
EBOOK: More often than not, development and security teams are at odds. In fact, as many as 52% of companies admit to cutting back on security measures in order to meet business demands, according to Contrast Security. In this report, learn how organizations can approach security with fewer frustrations and more collaboration between teams.
Posted: 27 Aug 2020 | Published: 27 Aug 2020

Contrast Security

The State of Application Security
sponsored by WhiteHat Security
WEBCAST: Attackers continue to take advantage of application flaws to compromise organizations and put their customers at risk. This means that as much as Dev teams prioritize faster release cycles, it’s important that they don’t overlook security. In this WhiteHat webinar, examine the state of application security and what you can do to stay protected.
Posted: 09 Dec 2020 | Premiered: Dec 9, 2020

WhiteHat Security

Go beyond Application Testing
sponsored by HCL Software
VIDEO: In this video, learn about what Continuous Security really is, and how this capability can be implemented into your organization.
Posted: 23 Mar 2021 | Premiered: 23 Mar 2021

HCL Software

Enabling a SASE Approach to Private Application Access and Security
sponsored by Axis Security
WHITE PAPER: Enterprises still lag in delivering and securing private applications to business users due to legacy security and access methods. Some businesses bring their legacy apps to the cloud, but these ‘cloudified’ apps still tend to underperform. Stop living in the past – check out this white paper on the Application Access Cloud by Axis Security.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

How to Prevent DDoS Attacks by Securing your DNS
sponsored by TechTarget
RESOURCE: Which of the following web and application security technologies is your company planning to purchase within the next 12 months? Secure application development and testing, web security, or application and container security? Let us know in our Web & Application Security Survey. As a thank you, you'll receive our expert guide.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

TechTarget

Application Security in the DevOps Environment
sponsored by HCL Technologies Limited India
RESEARCH CONTENT: Application security (AppSec) has grown in importance, especially in the DevOps environment. This report from the Ponemon Institute looks to understand the state of application vulnerabilities and testing, as well as AppSec risks, potential consequences, and best practices – read on to unlock the full report.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

HCL Technologies Limited India

Security Champions: Empowering Heroes to Unite Security and DevOps
sponsored by ZeroNorth
WHITE PAPER: ZeroNorth’s Security Champions program is gaining steam as the early adopters’ AppSec successes are becoming more and more clear. In this report, find the ins and outs of the Security Champions program, and see if the program is the right fit for your teams
Posted: 07 Jan 2021 | Published: 07 Jan 2021

ZeroNorth

APPSEC FOR THE NEWLY HIRED CISO/CSO
sponsored by Contrast Security
EBOOK: For new CISOs and CSOs, the tasks and demands of the new role can be overwhelming – especially as digital transformation changes conventional approaches to application security. Read this e-book for AppSec guidance and best practices for new CISO/CIOs.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Contrast Security

WhiteHat Pen Test Service
sponsored by WhiteHat Security
DATA SHEET: In this guide, learn how to maximize your application security with automated and continuous web application scanning plus periodic pen testing to find and fix crucial vulnerabilities faster. This advanced approach will significantly reduce the risk of data breaches and other cybersecurity incidents. Get the details first-hand here.
Posted: 13 Nov 2020 | Published: 13 Nov 2020

WhiteHat Security

Security Observability: Why Tracing?
sponsored by Traceable
WHITE PAPER: Cyberattacks can cost affected organizations as much as $13 million per year. What if you could reduce the time to detect a cyberattack all the way down to zero? How much could you save by detecting and stopping an attack while it’s still happening? Leverage this white paper to learn the 4 pillars of security observability.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Traceable
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info