IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed   
Buffer Overflows Reports
 
Simple, Secure Networking with SD-WAN
sponsored by Verizon
WEBCAST: Digital transformation has changed from a ‘down-the-road’ initiative to an action item. With the changing application landscape and increase in cloud connectivity, organizations need to become more adaptable – and fast. View this webcast on how SD-WAN can galvanize transformation by amplifying network performance and security.
Posted: 23 Jul 2020 | Premiered: Jul 23, 2020

Verizon

Digital Transformation at the Enterprise Edge
sponsored by CradlePoint
WEBCAST: Required capacity to connect is at an all-time high. Network security must be threat-ready, WANs must deliver performance and edge-to-cloud latency must be as low as possible. Is your network prepared? Watch this webcast for a deeper view of enterprise digital transformation and the technologies that are taking the lead.
Posted: 05 Aug 2020 | Premiered: Aug 5, 2020

CradlePoint

Infographic: Inside the Mobile Attack Surface
sponsored by NowSecure
RESOURCE: As mobile applications continue to play a critical role in communication, productivity and user experience, ensuring security becomes increasingly important. Download the following infographic for an overview of the mobile application attack surface, which includes common areas for potential privacy and security gaps.
Posted: 15 Jun 2020 | Published: 15 Jun 2020

NowSecure

5 Misconceptions About Dynamic Application Security Testing (DAST) for Mobile
sponsored by NowSecure
RESOURCE: Dynamic Application Security Testing (DAST) plays a critical role in any mobile app security and privacy program. However, long-held misconceptions create confusion, leading to slower and infrequent testing. Read this article to bust 5 common misconceptions about DAST for mobile.
Posted: 25 Jun 2020 | Published: 25 Sep 2019

NowSecure

Application Security with NGINX
sponsored by NGINX
WEBCAST: In today’s unpredictable security environment, organizations need to know how to implement effective security controls for their application infrastructure without impacting release velocity or application performance. In this webcast, learn how you can do just this, with specific business use cases as evidence.
Posted: 15 Sep 2020 | Premiered: Aug 5, 2020

NGINX

AppSec Best Practices vs. Practicality
sponsored by Veracode, Inc.
WHITE PAPER: When it comes to AppSec, teams must find a balance of best practices and practicality. Due to the realities of budgets, staff expertise, and time, not all best practices can be implemented successfully—but something is always better than nothing. In this guide, explore 5 key AppSec best practices and the practical steps your team can take now.
Posted: 07 May 2020 | Published: 07 May 2020

Veracode, Inc.

SAP Security Today: Five Challenges For CIOs
sponsored by Onapsis
WHITE PAPER: As cybercrime rates rise annually, the role of the CIO has shifted with the need to constantly produce and review a holistic security strategy. In this e-book, take a look at the 5 challenges CIOs face today with SAP security and how to combat those challenges using a holistic SAP security strategy.
Posted: 20 Apr 2020 | Published: 20 Apr 2020

Onapsis

Finding the Restful Path to Certificate Lifecycle Automation and Integration
sponsored by Entrust, Inc.
WHITE PAPER: As an IT leader, it’s important to have those you manage focused on the core functionalities of your business rather than be distracted by security processes. In this white paper, explore the features of Entrust Datacard’s PKI REST API, designed to shift some of the security busy-work away from your team. Read on to learn more.
Posted: 28 Apr 2020 | Published: 28 Apr 2020

Entrust, Inc.

What Every Security Professional Should Know About Third-Party OAuth Apps
sponsored by Proofpoint
WHITE PAPER: For CISOs, permitting third-party apps is a constant struggle, especially given the expansive use of cloud applications. What’s important is that security professionals in authentication are up to speed on what keeps a cloud account safe from OAuth attacks. Take a look at this FAQ/checklist to be informed on the risks of third-party apps.
Posted: 08 Sep 2020 | Published: 03 Sep 2020

Proofpoint

Contrast DevOps-Native AppSec Platform
sponsored by Contrast Security
DATA SHEET: Open-source components have created an entirely new playing field for vulnerabilities and cyberattacks. Security strategies must incorporate security instrumentation to strengthen AppSec platforms and properly accommodate for these new security demands. Learn about the Contrast Security Platform and its 3 components in this guide.
Posted: 26 Aug 2020 | Published: 26 Aug 2020

Contrast Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info