Buffer Overflows Reports

Securing your software supply chain
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Organisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.
Posted: 15 May 2023 | Published: 15 May 2023

TechTarget ComputerWeekly.com

Top DevSecOps certifications for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Check out some of the top DevSecOps certifications and trainings that can help professionals learn how to shift security left in the software development lifecycle.
Posted: 25 May 2022 | Published: 25 May 2022

TechTarget ComputerWeekly.com

Modern Mobility E-zine: In-App Analytics Get Down to Business
sponsored by TechTarget Mobile Computing
EZINE: In this issue of Modern Mobility, delve straight into in-app analytics, and learn how the insights this technology provides will keep mobile applications on track. Access this exclusive e-zine now to learn more about mobile backend as a service, and how to build apps that connect to data center infrastructure.
Posted: 13 Oct 2015 | Published: 13 Oct 2015

TechTarget Mobile Computing

Why it's Time to Add Security to DevOps Teams
sponsored by BMC
EGUIDE: Slow adopters of DevSecOps may think perimeter defense alone is enough, but high-profile breaches at Sony and other organizations say otherwise. Discover what experts are saying about how DevSecOps can help organizations approach security before -- not after -- the software development process.
Posted: 20 Jul 2016 | Published: 10 Jul 2016

BMC

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

What to Look for in Next-Generation Firewalls
sponsored by TechTarget Security
EBOOK: This Buyer's Guide goes in-depth on the process of selecting the best next-generation firewall for your company and how to ensure your organization has a clear understanding of its security requirements in the modern threat landscape.
Posted: 09 Jun 2016 | Published: 06 Jun 2016

TechTarget Security

Three Questions to Ask Before you Migrate Apps to the Public Cloud
sponsored by Oracle Dyn
ESSENTIAL GUIDE: Many firms assume public cloud is the best place to host all apps, but that's not always the case. Find out why in this essential guide.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Oracle Dyn

Fundamentals of Endpoint Security: Anti-Malware Protection
sponsored by Citrix
EGUIDE: Access this e-guide to learn about anti-malware protection and how endpoint security technology can prevent malware from infecting end-user computers and corporate networks.
Posted: 29 May 2018 | Published: 29 May 2018

Citrix

Unifying Endpoint Management with Windows 10
sponsored by VMware
EGUIDE: A key pain point for enterprises using Windows 10 is that you need insight into which devices require updates and which already have them. Read this guide to learn about this new unified endpoint management system to empower your employees while simplifying IT's job.
Posted: 07 Feb 2018 | Published: 05 Feb 2018

VMware

Mobile App Q&A: Mobile Expert Talks Security and Testing
sponsored by InfoStretch
EGUIDE: This e-guide provides an in-depth question & answer session with mobile application lifecycle management expert Manish Mathuria about the biggest problems around mobile app security. Access critical advice on how to design your mobile app security testing process to catch issues before they lead to a breach you can't afford.
Posted: 05 Feb 2016 | Published: 28 Jan 2016

InfoStretch