IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed   
Buffer Overflows Reports
 
Introduction to IAST
sponsored by Contrast Security
WHITE PAPER: Interactive Application Security Testing (IAST) is a technology for automatically identifying and diagnosing software vulnerabilities in applications and APIs. IAST continuously monitors your applications for vulnerabilities from within. In this white paper, learn everything you need to know about IAST.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

Contrast Security

Application Security Buyer's Guide
sponsored by Rapid7
EBOOK: In the Application Security Buyer's Guide, discover the major features and capabilities you should be looking for when selecting a DAST tool. You will also find some questions and techniques you can leverage to get the most out of your evaluation period.
Posted: 28 Jun 2019 | Published: 28 Jun 2019

Rapid7

Automated Security at the Speed of DevOps
sponsored by Trend Micro, Inc.
WHITE PAPER: As organizations implement DevOps on AWS, they need to understand the security implications. In this white paper, explore the main challenges businesses face at the intersection of DevOps and security. Also, learn best practices for integrating security within your development process from the start.
Posted: 01 Aug 2019 | Published: 01 Aug 2019

Trend Micro, Inc.

The Vulnerability Epidemic in Mobile Financial Apps
sponsored by Arxan
WEBCAST: A recent study examined the protective capabilities of more than 30 different financial services applications found on the Google Play store. In this webinar, Knight and Arxan chief scientist Aaron Lint discuss the report findings and share best practices to enhance mobile app protection.
Posted: 24 Jul 2019 | Premiered: Jul 24, 2019

Arxan

A Guide to Joining DevOps and Security
sponsored by Trend Micro, Inc.
EGUIDE: If you want to build out your DevOps and security programs in order to improve your application security initiatives, vulnerability testing has to be baked into your day-to-day processes. In this e-guide, explore tips for blending DevOps and security in order to help your organization catch vulnerabilities and resolve them quickly.
Posted: 09 May 2019 | Published: 03 May 2019

Trend Micro, Inc.

Wildflower Health Case Study
sponsored by Data Theorem
CASE STUDY: Wildflower helps families manage their health needs on one shared mobile application. However, the development team was facing both regulatory compliance and customer demand issues, as their apps process sensitive HIPAA-regulated data. In this case study, learn how Wildflower was able to achieve security coverage of all their mobile apps.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Data Theorem

Avoid the Breach With Effective Application Security Testing
sponsored by HackerOne
WEBCAST: Security is a top priority for e-commerce giant Shopify. Join Shopify's Vice President of Security Engineering and IT, Andrew Dunbar in this webcast as he discusses best practices for testing and securing your cloud-based web applications. The session will also cover how you can scale application security for high-growth DevOps organizations.
Posted: 04 Jun 2019 | Premiered: Jun 4, 2019

HackerOne

Secure DevOps Brings Better, Faster, Safer Software
sponsored by SearchSecurity.com
EBOOK: In the rush to implement DevOps, security is too often overlooked. But DevSecOps is essential in these hack-filled days. Learn how you can add security to software development today.
Posted: 03 May 2019 | Published: 03 May 2019

SearchSecurity.com

The Pen Test Dilemma
sponsored by HackerOne
WHITE PAPER: Today typical pen test methodologies are falling behind the increasingly innovative methods used by criminals. Why? In this white paper, learn about 3 common issues with traditional pen tests and how your organization could benefit from conducting hacker-powered pen tests instead.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

HackerOne

Protecting Against Threats with Updated Application Security Testing
sponsored by WhiteHat Security
ANALYST REPORT: In this Technology Spotlight report, IDC recommends application security testing tools that integrate security throughout the entire software development life cycle. Read on for an in-depth look at the role of WhiteHat Security in the marketplace for application security testing solutions.
Posted: 14 May 2019 | Published: 14 May 2019

WhiteHat Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement