IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed   
Buffer Overflows Reports
 
3 Threat Vectors Addressed by Zero Trust App Sec
sponsored by Traceable
WHITE PAPER: Zero trust has been around for some time, but implementations of a zero-trust model for network and application security are few and far between. Now, you can explore how a zero-trust approach can help protect applications from 3 dangerous threat vectors. Read the full blog post to learn what they are and what you can do.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Traceable

Datasheet (eng): CLOUD ONE™ - APPLICATION SECURITY
sponsored by Trend Micro
DATA SHEET: As reliance on business applications grows, it becomes increasingly critical to ensure each app and API is adequately protected and accounted for. Read this data sheet to see how Trend Micro’s Cloud One offering thwarts today’s application-specific cyberthreats.
Posted: 17 Feb 2021 | Published: 17 Feb 2021

Trend Micro

Get the Most Mileage Out of Your AppSec Program
sponsored by WhiteHat Security
WEBCAST: While formulating your race strategy to stay secure in 2021 and beyond, your security and development teams must be running at optimal performance to ensure vulnerabilities are identified and remediated. Join this webinar to learn how you can take your application risk management to the next level.
Posted: 17 Mar 2021 | Premiered: Mar 17, 2021

WhiteHat Security

Creating A Safe Environment For Under-Protected Apis
sponsored by Radware
WHITE PAPER: Learn how to create a safe environment for your under protected APIs and protect against the most common API attacks with Radware.
Posted: 06 Apr 2021 | Published: 06 Apr 2021

Radware

Bridge your Executive Team
sponsored by WhiteHat Security
WEBCAST: Application security is becoming increasingly important as applications play a more prominent role in driving today’s economy. Watch this webinar to learn more about the current state of AppSec, the challenges security teams are facing and how to get executive buy-in for AppSec initiatives.
Posted: 16 Dec 2020 | Premiered: Dec 16, 2020

WhiteHat Security

Overcoming the Legacy VPN Dilemma: Zero-Trust Access with Application Access Cloud
sponsored by Axis Security
WHITE PAPER: Employees are now everywhere, and while staff and integrated third-party remote work models are commonplace, the access models enabling them are outdated and broken. It’s now worth considering an application-level access solution that uses a zero-trust model. Access this white paper to discover such a solution.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Axis Security

WhiteHat Pen Test Service
sponsored by WhiteHat Security
DATA SHEET: In this guide, learn how to maximize your application security with automated and continuous web application scanning plus periodic pen testing to find and fix crucial vulnerabilities faster. This advanced approach will significantly reduce the risk of data breaches and other cybersecurity incidents. Get the details first-hand here.
Posted: 13 Nov 2020 | Published: 13 Nov 2020

WhiteHat Security

Simplifying Security for OpenShift and Ansible Environments with CyberArk
sponsored by Red Hat
WEBCAST: For organizations using OpenShift and Ansible – automated platforms for containerization and operations-based tasks, respectively – you may be wondering how to build additional security into your applications. Access this Red Hat webinar to learn how you can simplify security for these two platforms by leveraging CyberArk’s integrations.
Posted: 08 Apr 2021 | Premiered: Apr 8, 2021

Red Hat

Your Essential Guide to Container Security
sponsored by TechTarget
RESOURCE: In The Essential Guide to Container Security discover what steps you can take to avoid the 5 most common container and orchestrator vulnerabilities. Simply take our online survey to get your free copy.
Posted: 27 Oct 2020 | Published: 01 Mar 2021

TechTarget

Value Stream Management Essentials
sponsored by HCL Software
EGUIDE: In this eguide, read about Value Stream Management (VSM) and how you can learn the essentials to start your value stream journey.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

HCL Software
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences