IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed   
Buffer Overflows Reports
 
Duo: Most Loved Security Company Chooses Most Trusted Web Defense
sponsored by Signal Sciences
CASE STUDY: Learn how this leading security company achieved immediate security visibility and blocking, without impacting their user experience.
Posted: 16 Oct 2018 | Published: 16 Oct 2018

Signal Sciences

Delivering Safer Apps with Docker Enterprise and Windows Server
sponsored by Docker
WHITE PAPER: Many are now housing mission-critical applications in containers to accelerate the delivery of apps and reduce their possible attack surface. In this whitepaper, find the three keys to safer apps and how a migration to containers can help accomplish all of them in your organization.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

Docker

Application security: More important than ever
sponsored by IBM
EGUIDE: In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

IBM

Adobe Creative Cloud for enterprise security overview
sponsored by Adobe Inc
WHITE PAPER: Download this white paper to learn about the security features integrated into Adobe Creative Cloud, such as access control, encryption, identity management and much more.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Adobe Inc

Email+ Enhances PIM Security and Preserves the Native App Experience
sponsored by MobileIron
RESOURCE: Personal information management (PIM) apps are some of the most commonly used apps in the enterprise. But, how can you enhance the security of PIM apps without degrading the native app experience? Download this resource to find out.
Posted: 05 Nov 2018 | Published: 05 Nov 2018

MobileIron

How Cloudera Keeps its Machine Learning and Analytics Platform Secure
sponsored by Cisco Umbrella
CASE STUDY: In this case study, learn how a growing a US-based software company was able to safeguard its data across all of its cloud-based applications using a Cloud Access Security Broker (CASB).
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Cisco Umbrella

2018 Application Security Statistics Report
sponsored by WhiteHat Security
WHITE PAPER: This application security statistics report provides an analysis of the state of application security, brings to the forefront evolutionary trends, and highlights best practices that result in better application security over time. The report also presents challenges and opportunities to secure the applications.
Posted: 07 Dec 2018 | Published: 31 Dec 2018

WhiteHat Security

Advanced Application Threats Require an Advanced WAF
sponsored by F5 Networks
WHITE PAPER: New methods are needed to effectively automate the mitigation of fast-evolving threats. Read this white paper to learn about application security strategies that focus on preventing automated threats, which can help you make operational improvements, and lower operating costs.
Posted: 21 Sep 2018 | Published: 21 Sep 2018

F5 Networks

Application & Infrastructure Security Controls on the Kinvey Platform
sponsored by Progress Software, Inc.
WHITE PAPER: This white paper describes the security features of a mobile Backend as a Service (mBaaS) platform to help alleviate these security and privacy risks by isolating and protecting enterprise data sources and networks from client applications running on untrusted devices and their networks.
Posted: 29 Jun 2018 | Published: 29 Jun 2018

Progress Software, Inc.

Three Questions to Ask Before you Migrate Apps to the Public Cloud
sponsored by Oracle Dyn
ESSENTIAL GUIDE: Many firms assume public cloud is the best place to host all apps, but that's not always the case. Find out why in this essential guide.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Oracle Dyn
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement