IT Management  >   Systems Operations  >   Security  >  

Buffer Overflow

RSS Feed   
Buffer Overflow Reports
How Sunrun Secures & Monitors its Applications in Amazon ECS
sponsored by Sysdig
CASE STUDY: Implementing run-time security as well as monitoring tooling for your containerized and microservice based infrastructure are two very large challenges. What about getting visibility into your environment? This case study examines how to overcome these key challenges to better secure your environment and monitor your environment.
Posted: 18 Jan 2018 | Published: 18 Jan 2018


Cloud migration: Choosing the right strategy and tools
sponsored by
EGUIDE: In this e-guide, learn how to sell the value of cloud to the C-suite, roll DevOps tools into your migration plan, and avoid access control mistakes that could lead to data breaches that have hit the headlines of late.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

Next-Gen Firewall Buyer's Guide
sponsored by Sophos
RESOURCE: It is difficult to know where to start when evaluating firewalls; most are incredibly complex, lacking in essential features, and provide little if any visibility into what's happening on your network. Explore this next-generation firewall buyer's guide to gain insight into evaluating the right firewall for your organization's needs.
Posted: 04 Jan 2018 | Published: 04 Jan 2018


Mitigating the SSL/TLS Cybersecurity Threat
sponsored by Radware
WHITE PAPER: 75% of web traffic will be encrypted by 2019, according to NSS Labs. Utilize this e-book to learn how to combat the growing number of complex encrypted web attacks as well as mitigate SSL/TLS cybersecurity threats.
Posted: 09 Mar 2018 | Published: 09 Mar 2018


The Cyber Security at Your Company is at Risk
sponsored by Veracode, Inc.
WEBCAST: Click inside to learn how you can gain end-to-end, cloud-based platform security for both your endpoints and your application layer.
Posted: 24 Jan 2018 | Premiered: Jan 24, 2018

Veracode, Inc.

Identity Management and Governance: Bridging the Gap Between IT and Users
sponsored by CA Technologies
RESOURCE: This solution brief explores how an IAM technology that combines robust functionality with an intuitive and business-oriented experience can help you meet modern security challenges
Posted: 02 Feb 2018 | Published: 31 Dec 2016

CA Technologies

Protect Your Explanding Attack Surface - Insights & Advice from 29 InfoSec Leaders
sponsored by Tenable, Inc.
EBOOK: This resource offers insight from 29 cybersecurity professionals regarding how they are beginning their cyber exposure journey to protect expanding attack surfaces.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Tenable, Inc.

Application Security Testing Magic Quadrant
sponsored by WhiteHat Security
RESOURCE: Application security testing (AST) is growing faster than any other market. Gartner predicts that by 2019, 80% of application security testing vendors will include software composition analysis in their offerings. This Gartner Magic Quadrant report reveals strengths and cautions of different vendor's AST programs as well as a market overview.
Posted: 23 Jan 2018 | Published: 23 Jan 2018

WhiteHat Security

Getting the Board on Board with Application Security
sponsored by WhiteHat Security
WHITE PAPER: CISOs need to make sure their business considers AppSec from the highest levels. Review these 4 recommendations to improve your business' AppSec and get the support you need.
Posted: 18 Jan 2018 | Published: 31 Dec 2017

WhiteHat Security

Privilege Manager Tool
sponsored by Thycotic
WHITE PAPER: Targeted attacks are always after accounts with highly elevated privileges on sensitive and critical systems: privileged accounts. Explore this resource to gain insight into least privilege management and endpoint security strategies.
Posted: 23 Jan 2018 | Published: 23 Jan 2018


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement