IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed   
Buffer Overflows Reports
 
Next-Generation Firewall Buyer’s Guide
sponsored by Palo Alto Networks
RESOURCE: Cloud adoption, big data analytics, machine learning and automation are all accelerating the delivery of applications, which in and of themselves are becoming increasingly accessible. However, this also means that apps are more vulnerable than ever. Browse this guide to learn how Next-Gen Firewalls can minimize risk without slowing you down.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

Palo Alto Networks

Product Video: Enterprise Application Access
sponsored by Akamai Technologies
VIDEO: With remote work at an all-time high, it’s critical that only the correct users get access to the right applications at the right time. Now, this can be done without granting a user full access to a network. How? By integrating tools such as MFA, SSO and identity onto one secure access platform. Watch this video to get a closer look.
Posted: 18 Aug 2020 | Premiered: 18 Aug 2020

Akamai Technologies

Addressing Complexity and Expertise in Application Security Testing
sponsored by WhiteHat Security
RESEARCH CONTENT: The Verizon’s 2020 DBIR indicated that 43% of data breaches begin by targeting a web application. This discovery has begun to shift the cybersecurity paradigm from focusing on on-premise infrastructures to protecting their web apps with application security testing (AST). Read this 451 Research brief to learn more about AST.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

WhiteHat Security

2020 Election Security
sponsored by WhiteHat Security
WHITE PAPER: Around the globe, we’ve witnessed how cybercriminals can create chaos during election cycles by disqualifying legitimate voters, corrupting voter data and launching denial-of-service attacks. In recent years, U.S. elections have come under continuous assault. See this white paper to learn about the security challenges this causes for the country.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

WhiteHat Security

Application Security in the DevOps Environment
sponsored by HCL Software
EBOOK: The purpose of the Application Security in the DevOps Environment study, sponsored by HCL Software, is to better understand the state of organizations' ability to quickly prioritize and repair vulnerabilities in their applications.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

HCL Software

VMware NSX Advanced Load Balancer
sponsored by VMware International Unlimited Company
ANALYST REPORT: Do you experience major fluctuations in internet traffic? Instead of purchasing, installing, and supporting appliance-based load balancers to direct your organization’s web traffic, you can turn to a software-defined solution. Dive into this report to read the science behind VMware’s NSX Advanced Load Balancer.
Posted: 14 Oct 2020 | Published: 30 Apr 2020

VMware International Unlimited Company

Auth0 Platform Introduction
sponsored by Auth0
WEBCAST: This short video provides a demo of Auth0, a universal authentication and authorization platform that enables developers to connect their disparate applications. Watch now for an overview of this process across B2B, B2C and B2E use cases.
Posted: 02 Jul 2020 | Premiered: Jul 2, 2020

Auth0

Turn a Mobile App Into a Major Win
sponsored by Onegini
CASE STUDY: For organizations in the healthcare industry, mobile applications and telemedicine are becoming the norm. Read this case study to see how VGZ, one of the largest health insurers in the Netherlands, was able to build an application that was secure, complaint and faster than their website – without sacrificing user experience.
Posted: 12 Nov 2020 | Published: 12 Nov 2020

Onegini

Bringing an End to Security Roadblocks
sponsored by Contrast Security
EBOOK: From a developer’s perspective, legacy tools create delays at every turn. Luckily, this guide proposes a simple solution: security instrumentation. Learn how security instrumentation builds security monitoring and response into the application itself for continuous insight—and no bottlenecks. Read more here.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Contrast Security

Rethink Firewalls: The Compelling Economic Case for Software-Based Segmentation
sponsored by Guardicore
WHITE PAPER: Why are IT and security teams still relying on legacy firewalls to do internal network segmentation? As policy-protected applications and segments proliferate, physical firewall appliances are proving ineffective in today’s increasingly dynamic hybrid-cloud environments. Read this white paper to learn about software-based segmentation.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Guardicore
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info