IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed   
Buffer Overflows Reports
 
Unified MTD + MARS is the Best Practice for Mobile Security
sponsored by Lookout
WEBCAST: Download this webcast to understand the full mobile risk matrix and discover how mobile threat defense (MTD) combined with mobile app reputation services (MARS) can protect your organization from mobile threats to apps, devices, networks and more.
Posted: 17 Jan 2018 | Premiered: Jan 17, 2018

Lookout

Microservices vs. Service-Oriented Architecture
sponsored by NGINX
WHITE PAPER: Both microservices architecture and SOA are considered service-based architectures with shared characteristics, but very different architecture styles. This 50+ page e-book compares the two architectures to enable you to make the best choice to meet your organization's unique needs.
Posted: 11 Jan 2018 | Published: 11 Jan 2018

NGINX

3 Reasons: Why DevOps is a Game-Changer for Security
sponsored by Tenable, Inc.
WHITE PAPER: Oftentimes, security teams have struggled with keeping pace with DevOps. This resource explores the intersection of DevOps and InfoSec and offers 3 reasons why security organizations will benefit by combining these 2 practices.
Posted: 06 Feb 2018 | Published: 06 Feb 2018

Tenable, Inc.

Applying Secure Design Patterns to Microservices Development
sponsored by Whitehat Securities
VIDEO: From a developer's perspective, find out what you can do to improve app security for microservices-based development so that you can find and resolve issues even as you continuously release and iterate code.
Posted: 25 Jan 2018 | Premiered: 16 Jan 2018

Whitehat Securities

Next-Gen Firewall Buyer's Guide
sponsored by Sophos
RESOURCE: It is difficult to know where to start when evaluating firewalls; most are incredibly complex, lacking in essential features, and provide little if any visibility into what's happening on your network. Explore this next-generation firewall buyer's guide to gain insight into evaluating the right firewall for your organization's needs.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Sophos

Breaking the Bottlenecks in Your SDLC
sponsored by Blueprint Software
WHITE PAPER: Discover how to apply the principles of Agile throughout the software development lifecycle (SDLC) and to the enterprise as a whole so that you can achieve Agile development at scale.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Blueprint Software

State of Software Security
sponsored by Veracode, Inc.
WHITE PAPER: According to this report the top 10 list of most common vulnerability categories in 2017 is strikingly similar to 2016. Information leakage was again the most prevalent, present in 66% of apps on initial scan. Inside this report, State of Software Security, uncover trends over time, benchmark performance, and identify best practices.
Posted: 12 Jan 2018 | Published: 28 Dec 2017

Veracode, Inc.

APIs: The New Language of Business Collaboration
sponsored by Red Hat
WHITE PAPER: Explore the role played by APIs in enabling the agility demanded by the disruptive business world of digital transformation.
Posted: 11 Jan 2018 | Published: 31 Dec 2017

Red Hat

2017 Application Security Statistics Report
sponsored by Whitehat Securities
VIDEO: According to the Verizon DBIR, 30% of total breaches reported involved attacks on web applications. This webinar explores effective application security programs by using data from the WhiteHat Application Security Statistics Report.
Posted: 23 Jan 2018 | Premiered: 16 Jan 2018

Whitehat Securities

Worldwide Mobile Threat Management Security Software Vendor Assessment
sponsored by Lookout
ANALYST REPORT: The mobile security market is expanding and you need to know how to evaluate the different vendors. This IDC report discusses how you can go about your own evaluation process and breaks down one of the leading vendors as an example.
Posted: 12 Jan 2018 | Published: 29 Sep 2017

Lookout
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement