IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed   
Buffer Overflows Reports
 
Automating Software Security Checks for Open Source Software and SDKs
sponsored by Data Theorem
WEBCAST: The growth of open source software (OSS) and 3rd-party software development kits (SDKs) have been on the rise over the last 5 years, and for good reason. But there are downsides. Learn about them in this webinar, which covers: Risks of using OSS and SDKs for apps, challenges of staying ahead of vulnerability issues in 3rd-party software, and more.
Posted: 11 Apr 2019 | Premiered: Apr 11, 2019

Data Theorem

Exploring the Past, Present, And Future of Blockchain Technology
sponsored by Armor
WHITE PAPER: Since its early applications in cryptocurrency, blockchain implementations have focused on keeping data secure. But the journey of blockchain technology now stretches beyond Bitcoin. For businesses, blockchain implementations can provide a secure way to store and track transactions. In this white paper, learn more about blockchain technology.
Posted: 07 May 2019 | Published: 07 May 2019

Armor

Cloud Access Security Broker- Market Quadrant 2018
sponsored by Forcepoint
RESEARCH CONTENT: Cloud Access Security Brokers (CASBs) serve to monitor activity and enforce security policies between cloud users and cloud applications. CASBs also give organizations visibility into authorized and non-authorized cloud applications. In this Radicati Market Quadrant, explore key CASB vendors in the market.
Posted: 14 May 2019 | Published: 31 Oct 2018

Forcepoint

Securing Code with Advanced SAST
sponsored by WhiteHat Security
WHITE PAPER: Download this white paper to learn how a static application security testing (SAST) tool, can help your teams ensure that app code is secure – from development to pre-production – through effective scanning and remediation of vulnerabilities.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

WhiteHat Security

2018 Secure DevOps: Fact or Fiction?
sponsored by WhiteHat Security
WHITE PAPER: You need to build application security into continuous delivery circles, but this requires a new way of thinking about app security. Dive into this whitepaper of DevSecOps to learn how to keep your DevOps app development process from repeating the same security mistakes of the recent past.
Posted: 07 Mar 2019 | Published: 31 Dec 2018

WhiteHat Security

The Hacker Report
sponsored by HackerOne
WHITE PAPER: Many hackers are finding career building opportunities through bug bounties, with companies hiring from within the hacker community at a faster clip than ever before. As hacking grows in popularity, training continues to be a focus. Download this research report that details more than 300,000 individuals who represent the hacker community today.
Posted: 08 Mar 2019 | Published: 08 Mar 2019

HackerOne

How to Navigate the Intersection of DevOps and Security
sponsored by Synopsys
WHITE PAPER: Open this whitepaper on navigating the intersection of DevOps and security to learn how to include security early on in your development process and keep your deployment schedule moving smoothly.
Posted: 14 May 2019 | Published: 31 Jul 2018

Synopsys

The CISO's Ultimate Guide to Securing Applications
sponsored by Synopsys
WHITE PAPER: In The CISO's Ultimate Guide to Securing Applications, discover the tools and services you need to get your application security program on track.
Posted: 13 May 2019 | Published: 13 May 2019

Synopsys

Secure Coding Best Practices Handbook
sponsored by Veracode, Inc.
WHITE PAPER: Access this whitepaper to learn some of the best steps you can take today to have more secure coding practices, and the many risks you'll be able to address.
Posted: 21 May 2019 | Published: 21 May 2019

Veracode, Inc.

Build Context-Aware Networks with this Smart Router
sponsored by 128 Technology
PRODUCT OVERVIEW: In this white paper, learn about 128 Technology's Session Smart Router, a modernized and secure routing model for building context-aware networks—which gives you the reliable application performance you need.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

128 Technology
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement