Buffer Overflow Reports

VMs vs. containers: Which is better for security?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 08 Feb 2021 | Published: 02 Oct 2019

TechTarget ComputerWeekly.com

Infographic: How blockchain works
sponsored by TechTarget ComputerWeekly.com
EGUIDE: To get a solid understanding of how to use blockchain in an enterprise setting, CIOs must first grasp how a unit of value in a transaction moves from party A to party B. This infographic details how blockchain works from transaction initiation, through verification, all the way to delivery.
Posted: 08 Feb 2021 | Published: 17 Sep 2019

TechTarget ComputerWeekly.com

Software Today: What Applications Now Look Like
sponsored by Veracode, Inc.
WHITE PAPER: Download this infographic to see how modern applications are different today, and learn where you can take steps to prevent security risks throughout the development process.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

How to Recognize and Prevent Mobile Security Threats
sponsored by Microsoft
EGUIDE: Learn how to recognize and prevent mobile security threats for application development and deployment, all while discovering how to not fall victim to the 2 most common mobility challenges.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Microsoft

Making the Case for Data-Aware Storage
sponsored by DataGravity
EGUIDE: This e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.
Posted: 01 Mar 2016 | Published: 23 Feb 2016

DataGravity

5 Post-Hot Patch App Ban Risks and the Value of Security Assessments
sponsored by Blue Cedar
EGUIDE: Discover the value of application assessments when determining security risk, and 5 areas that need to be considered for enterprise app security in the face of Apple's decision to ban hot patches.
Posted: 13 Jul 2017 | Published: 11 Jul 2017

Blue Cedar

How to Overcome Middleware Security Risks
sponsored by Red Hat
EGUIDE: This expert e-guide provides a step-by-step process to secure middleware through application lifecycle management, network security, and security for specific middleware tools and interfaces. Also discover a case study about how the FAA exploited web-oriented open source middleware to improve integration and cut costs.
Posted: 26 Feb 2016 | Published: 22 Feb 2016

Red Hat

How Etsy's DevOps Teams Fend off Fraudsters
sponsored by BMC
EGUIDE: In this e-guide, experts reveal how innovative online businesses like Etsy are implementing next-generation web application firewalls that support DevSecOps initiatives. Learn what insiders are saying about guarding borders vs. securing during the development process, how the latter model could have prevented high-profile breaches, and more.
Posted: 14 Sep 2016 | Published: 07 Sep 2016

BMC

How to Keep up with Governance, Risk, and Compliance in the face of Faster App Development
sponsored by TechTarget App Architecture
EBOOK: This handbook explores how to implement holistic governance, risk, and compliance (GRC) for SOA and microservices by leveraging ALM, APIs, and Web Services Security. Learn more about microservices and how they're changing the world of app security.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

TechTarget App Architecture

Is the Endpoint Security Nightmare Ending?
sponsored by TechTarget Security
EBOOK: In our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

TechTarget Security