Buffer Overflows Reports

The Complete Playbook to Operationalizing IaC Security
sponsored by Palo Alto Networks
EBOOK: If you have to shore up your cloud infrastructure security after you’ve already embedded IaC into your workflows, there are a few common challenges you’ll face—cloud infrastructure drift and misconfigured open source IaC components among them. Overcome these IaC challenges by reading this e-book.
Posted: 08 Nov 2023 | Published: 08 Nov 2023

Palo Alto Networks

VMs vs. containers: Which is better for security?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 08 Feb 2021 | Published: 02 Oct 2019

TechTarget ComputerWeekly.com

Evaluating and Selecting AppSec Vendors to Fit Your Business Needs
sponsored by Veracode, Inc.
RESOURCE: The application security (AppSec) market is oversaturated with an abundance of options, which can make finding an AppSec vendor/offering best fit for your unique needs a difficult task. Read this infosheet for some expert guidance to help get you started on your AppSec journey.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

Veracode, Inc.

Antimalware Protection and the Fundamentals of Endpoint Security
sponsored by OPSWAT inc
EGUIDE: In this expert e-guide, uncover the key features of endpoint antimalware protection, as well as how to deploy/manage endpoint antimalware tools.
Posted: 31 Aug 2017 | Published: 29 Aug 2017

All resources sponsored by OPSWAT inc

Information Security Magazine: November Issue
sponsored by TechTarget Security
EZINE: What strategies are companies using to protect data against mobile security threats? In Information Security, we ask CISOs who have been there: What works?
Posted: 02 Nov 2015 | Published: 02 Nov 2015

TechTarget Security

How to Keep up with Governance, Risk, and Compliance in the face of Faster App Development
sponsored by TechTarget App Architecture
EBOOK: This handbook explores how to implement holistic governance, risk, and compliance (GRC) for SOA and microservices by leveraging ALM, APIs, and Web Services Security. Learn more about microservices and how they're changing the world of app security.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

TechTarget App Architecture

From DevOps to DevSecOps: Integrating Security
sponsored by BMC
EGUIDE: They key to launching successful DevSecOps initiatives is to help teams spread security activities throughout the development lifecycle, a skillset that experts suggest many developers lack. Discover ways to integrate security into DevOps practices, and how to encourage collaboration within these teams.
Posted: 14 Sep 2016 | Published: 07 Sep 2016

BMC

Unifying Endpoint Management with Windows 10
sponsored by VMware
EGUIDE: A key pain point for enterprises using Windows 10 is that you need insight into which devices require updates and which already have them. Read this guide to learn about this new unified endpoint management system to empower your employees while simplifying IT's job.
Posted: 07 Feb 2018 | Published: 05 Feb 2018

VMware

Fundamentals of Endpoint Security: Anti-Malware Protection
sponsored by Citrix
EGUIDE: Access this e-guide to learn about anti-malware protection and how endpoint security technology can prevent malware from infecting end-user computers and corporate networks.
Posted: 29 May 2018 | Published: 29 May 2018

Citrix

What to Look for in Next-Generation Firewalls
sponsored by TechTarget Security
EBOOK: This Buyer's Guide goes in-depth on the process of selecting the best next-generation firewall for your company and how to ensure your organization has a clear understanding of its security requirements in the modern threat landscape.
Posted: 09 Jun 2016 | Published: 06 Jun 2016

TechTarget Security