Buffer Overflows Reports

PERIMETER SECURITY NOISE LEAVES APPLICATIONS VULNERABLE TO ATTACKS
sponsored by Contrast Security
WHITE PAPER: Learn how you can get AppSec protection that can compensate with the necessary visibility, accuracy, scalability, and ease of deployment to keep pace with modern application vulnerabilities without generating false positives and false negatives.
Posted: 08 Feb 2021 | Published: 08 Apr 2020

Contrast Security

Application security: More important than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at why application security is more important than ever due to traditional software and cloud-based, web and mobile applications playing an increasingly important role in business.
Posted: 08 Feb 2021 | Published: 11 Jun 2018

TechTarget ComputerWeekly.com

How to Boost Mobile Application Security
sponsored by IBM
EGUIDE: In this expert e-guide, discover ways to boost mobile application security by performing regular assessments to help eliminate an enterprise's vulnerability to data breaches and attacks.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

Cybersecurity skills shortage demands new workforce strategies
sponsored by IBM
EGUIDE: The race to find InfoSec professionals who can outpace advanced threats has companies worldwide facing hurdles. This e-guide discusses organizations' want for better qualified candidates and reveals what skills exactly most security professionals are currently lacking.
Posted: 23 Jun 2016 | Published: 21 Jun 2016

IBM

How to Keep up with Governance, Risk, and Compliance in the face of Faster App Development
sponsored by TechTarget App Architecture
EBOOK: This handbook explores how to implement holistic governance, risk, and compliance (GRC) for SOA and microservices by leveraging ALM, APIs, and Web Services Security. Learn more about microservices and how they're changing the world of app security.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

TechTarget App Architecture

EMM: Only One Ingredient in the Mobile Enablement Stew
sponsored by TechTarget Mobile Computing
EBOOK: Enterprise mobility management (EMM) it isn't the end-all, be-all for mobility strategies. Every company starting a mobile initiative needs an extensive, tailor-made plan to meet its specific needs and goals. Read on to learn about the role EMM should play in your mobile strategy.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

TechTarget Mobile Computing

QRadar: Expert SIEM Product Overview
sponsored by IBM
EGUIDE: Looking for all the security features IBM's security information and event management (SIEM) tool has to offer? Look no further. Principal consultant, Karen Scarfone takes an unbiased look into QRadar. Learn how its features allow easy collection of log data from hosted assets, operating systems, applications, vulnerabilities, and user behavior.
Posted: 23 Jun 2016 | Published: 01 May 2016

IBM

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

How to Build an Enterprise Application Security Program
sponsored by IBM
EGUIDE: In this e-guide, learn the key steps to building an enterprise application security program to decrease exposure to potential attackers through statics and dynamic application testing.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

IBM

IoT Poses New Problems for Developers
sponsored by TheServerSide.com
EBOOK: This expert handbook addresses three major issues posed by the IoT: security, analytics, and application testing. Uncover key insights on how to overcome these challenges and deliver secure, trustworthy, and valuable IoT devices.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

TheServerSide.com