IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed   
Buffer Overflows Reports
Contrast Protect: Runtime Application Protection And Observability
sponsored by Contrast Security
RESOURCE: Contrast Protect is a runtime application protection and observability solution that uses real-time analysis of application runtime events to confirm exploitability before taking action to block an attack. Download this solution brief to learn more about the capabilities and benefits of Contrast Protect.
Posted: 07 Jun 2021 | Published: 07 Jun 2021

Contrast Security

Protecting APIs and Securing Applications So Business Can Thrive
sponsored by Radware
RESEARCH CONTENT: Nearly every organization relies on applications to connect with customers, business partners, suppliers and staff. As a result, the application and API threat landscape has evolved dramatically. Read this research report for a closer look at the state of application and API security, including top threats, best practices and more.
Posted: 26 Jan 2021 | Published: 26 Jan 2021


How a Northeastern State Strengthened Application Security for their Voter Registration System
sponsored by WhiteHat Security
CASE STUDY: Elections are very heavily targeted by threat actors. Troublemakers as they are, these actors will go to great lengths to breach voter privacy, even by accessing user information to impersonate voters. One state recognized this and wanted to ensure the security of their voter registration apps. See this case study to learn how they did it.
Posted: 02 Dec 2020 | Published: 02 Dec 2020

WhiteHat Security

Leveraging the cloud to reinforce 7 critical layers of security
sponsored by Hyland
EBOOK: If your data and your customers’ data is vulnerable to incursions or catastrophic events, the future of your business isn’t safe. Without proper defensive measures, your data is unprotected and your ability to service customers can be impacted. View this e-book to learn how to leverage the cloud to maximize 7 critical layers of security.
Posted: 18 Nov 2020 | Published: 18 Nov 2020


API Security & the OWASP API Top 10
sponsored by Traceable
VIDEO: The OWASP API Top 10 project set out with a clear goal – to identify and provide insight into the most detrimental API vulnerabilities that exist across today’s organizations. Watch this episode of The API Security & the OWASP API Top 10 webinar series for a deep dive into 4 of the 10 critical API threats.
Posted: 17 Feb 2021 | Premiered: 03 Jan 2021


If You Think You Can’t Afford to Protect Office 365, Think Again.
sponsored by arcserve
DATA SHEET: 56% of businesses use Office 365, yet most leave themselves wide open to cyberattacks and data loss without third-party protection. Why? Many assume Microsoft is backing up their data, but it’s actually up to you – the user – to protect from the unknown. So how can you start? Examine this data sheet to see a good first step.
Posted: 01 Dec 2020 | Published: 01 Dec 2020


CASB Cloud Application Visibility & Controls
sponsored by iBoss
WHITE PAPER: The ability to apply fine grained controls and gain visibility into cloud application use is critical with the move of applications to the cloud. View this white paper to learn how you can apply these controls to your organization’s CASB.
Posted: 19 Mar 2021 | Published: 19 Mar 2021


Why Security is Now a Critical Component of Application Delivery
sponsored by Radware
WHITE PAPER: Because today’s threats can be so costly, combining application protection with application delivery has become mission-critical. Radware Alteon is an application delivery solution that integrates web application firewall (WAF), bot management and automation to ensure apps stay secure. Jump into this solution brief for a product overview.
Posted: 25 Jan 2021 | Published: 25 Jan 2021


Veracode Security Labs
sponsored by Veracode, Inc.
WHITE PAPER: Software developers are the only ones who can fix vulnerabilities in their code. Yet they aren’t often trained to identify or remediate vulnerabilities – or code securely, for that matter. Now, Veracode might have what you need. Download this white paper to discover a plethora of security trainings on today’s most relevant AppSec topics.
Posted: 27 Apr 2021 | Published: 31 Mar 2021

Veracode, Inc.

Creating A Safe Environment For Under-Protected Apis
sponsored by Radware
WHITE PAPER: Learn how to create a safe environment for your under protected APIs and protect against the most common API attacks with Radware.
Posted: 06 Apr 2021 | Published: 06 Apr 2021


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences