IT Management  >   Systems Operations  >   Security  >  

Buffer Overflows

RSS Feed   
Buffer Overflows Reports
 
Salesforce Data Protection Through User Activity Monitoring
sponsored by FairWarning
WHITE PAPER: Salesforce holds a vast amount of regulated, proprietary and confidential information. But as data theft trends increase, a better way to protect this information is needed. In this white paper, gain a better understanding of the need for Salesforce data protection and user activity monitoring.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

FairWarning

Securing the Mobile and API Connected Work Space: Evernote Case Study
sponsored by Data Theorem
VIDEO: Evernote is a global software provider of mobile applications for individuals and teams. In this video, learn how Data Theorem helped Evernote identify and close 105 security issues and remove 17 harmful third-party libraries, all before releasing them to the public app stores.
Posted: 18 Sep 2019 | Premiered: 18 Sep 2019

Data Theorem

x86 to LinuxONE Redbook
sponsored by IBM
WHITE PAPER: LinuxONE is a portfolio of hardware, software, and solutions for an enterprise-grade Linux environment. It has been designed to run more transactions faster and with more security and reliability specifically for the open community. In this white paper, learn about the process of migrating from x86 to LinuxONE.
Posted: 10 Oct 2019 | Published: 31 Jan 2017

IBM

Prescriptive, Unbiased Website Security Advice
sponsored by Tala Security
RESOURCE: The ecommerce economy continues to grow with nearly $3.5 trillion spent in 2019. Website owners have an obligation to protect their sites, their data, and their customers to ensure the integrity of online transactions. In this resource, explore a list of recommendations to help organizations ensure website security.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

Tala Security

Hype Cycle for Application Security, 2019
sponsored by Data Theorem
ANALYST REPORT: Download the 2019 version of Hype Cycle for Application Security to learn about app security technology on the rise, at the peak, sliding into the trough, and more.
Posted: 26 Sep 2019 | Published: 26 Sep 2019

Data Theorem

7 steps to operationalize your micro-segmentation deployment
sponsored by Guardicore
WHITE PAPER: Micro-segmenting your networks is a good idea because it creates secured, isolated zones, thus reducing the organizational attack surface. However, a key aspect of a successful micro-segmentation project is making sure you're prepared. In this white paper, explore 7 steps to operationalize your micro-segmentation deployment.
Posted: 18 Jun 2019 | Published: 18 Jun 2019

Guardicore

Organizations are failing to protect sensitive data in the cloud
sponsored by Thales
WHITE PAPER: This infographic highlights some of the key takeaways from the 2019 Thales Cloud Security Study. Continue reading to uncover research findings as they relate to the amount of data stored, the kind of data & the prevalence of encryption or other security measures.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Thales

Who’s Stalking Mobile App Users?
sponsored by The Media Trust
WHITE PAPER: It’s difficult to disagree with the convenience of mobile applications, but have you ever considered the data being captured? Consumer awareness and regulations like GDPR & CCPA are creating a dramatic shift in app development and experience. In this report, find hidden vulnerabilities, the role of cookies & other findings.
Posted: 01 Nov 2019 | Published: 31 Oct 2019

The Media Trust

Best practices for secure cloud migration
sponsored by Thales
WHITE PAPER: The Cloud Security Alliance (CSA) is an organization whose mission is to promote best practices & provide education for cloud security. Recently, the CSA released a guide that covered best practices, key considerations & use cases. Is your organization considering adoption of cloud services? Read on to enhance your understanding.
Posted: 11 Nov 2019 | Published: 30 Jun 2019

Thales

The Next Wave of Bot-Driven Brute Force Attacks
sponsored by F5 Networks
EBOOK: With most cyberattacks targeting critical business applications, protecting the capabilities that drive your business means protecting the apps that make them happen. In this e-book, explore the next generation of bot attacks and uncover best-practices for stopping credential theft.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

F5 Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement