IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed   
Buffer Overflows Reports
 
Deliver a Secure Digital Workspace with Next-Gen Remote Access Solutions
sponsored by Citrix
WHITE PAPER: Digital transformation is the rocket fuel that helps companies boost productivity, engage consumers, and empower their people. However, the new application infrastructure is also posing new workflow challenges and security risks. In this white paper, learn how a secure digital perimeter enables IT to combat these security risks.
Posted: 19 Jul 2019 | Published: 19 Jul 2019

Citrix

6 Steps to Container Security
sponsored by Trend Micro, Inc.
WHITE PAPER: Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.
Posted: 31 Jul 2019 | Published: 31 Mar 2019

Trend Micro, Inc.

A Security Guide to Container Orchestration
sponsored by Lacework
WHITE PAPER: It's hard to argue against the benefits of containers and containerized apps running on cloud resources. However, containers create new cloud security challenges. Download this Security Guide to Container Orchestration to learn how you can stay secure in your various cloud environments today.
Posted: 29 May 2019 | Published: 29 May 2019

Lacework

Getting Started with DevSecOps
sponsored by ZeroNorth
WEBCAST: Collaboration between development and security teams is key to DevSecOps transformation and involves both cultural and technological shifts. In this webcast, Andrei Bezdedeanu, ZeroNorth VP of Engineering, discusses how to get started with DevSecOps and the resulting benefits.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

ZeroNorth

5 Principles of Effective IT Security
sponsored by VMware
WHITE PAPER: Keeping data, applications, and devices secure has always been a top priority for IT security professionals. In order to do this, IT security teams should focus on reducing their attack surface to make their applications less vulnerable to attacks. In this white paper, explore 5 core principles to an effective application security strategy.
Posted: 17 Jun 2019 | Published: 30 Apr 2019

VMware

Trend Report: Employees Like to Use Unsanctioned Apps — and Don't Plan to Stop
sponsored by Cisco Umbrella
WHITE PAPER: Employees are downloading apps to do their work faster, but this is causing risk to the business. IT can't secure what it can't see, which means threats can creep in. In this white paper, learn how Cisco Umbrella can help you discover which SaaS apps are being used, who's using them, and what risks they pose to your organization.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Cisco Umbrella

Building a Business Case for Expanding Your Appsec Program
sponsored by Veracode, Inc.
WHITE PAPER: Code vulnerabilities and cyber threats are affecting absolutely everyone, and there is no longer any reason for security to be an afterthought in the application development process. Jump into this guide to learn how to build your case for a shift left in application security.
Posted: 25 Sep 2019 | Published: 25 Sep 2019

Veracode, Inc.

The Age of Digital Transformation: 5 Keys to Securing Your Business Critical Applications
sponsored by Cyber-Ark Software
WHITE PAPER: The digital transformation of enterprise IT has increased the challenge of protecting business critical applications. Securing business-critical applications means access must be reserved for individuals with the proper credentials and permissions. In this white paper, learn 5 key requirements to better protect your business critical applications.
Posted: 12 Jul 2019 | Published: 31 Mar 2019

Cyber-Ark Software

The Total Economic Impactâ„¢ Of HackerOne Challenge
sponsored by HackerOne
RESEARCH CONTENT: HackerOne provides security and compliance penetration (pen) testing services that help its customers identify and remediate security vulnerabilities. To understand the benefits, costs, and risks associated with this investment, Forrester interviewed 4 customers with experience using HackerOne Challenge. Download the report for key findings.
Posted: 10 May 2019 | Published: 31 May 2019

HackerOne

Debunking No-code and Low-code Adoption Myths
sponsored by Crowd Machine
RESOURCE: The following post will set the record straight and debunk the three most common myths about no-code and low-code platforms. Read it here to separate fact from fiction and to get an objective take on what these platforms are capable of.
Posted: 12 Aug 2019 | Published: 03 May 2019

Crowd Machine
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement