Buffer Overflow Reports

VMs vs. containers: Which is better for security?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Practitioners are mandated to make technology risk decisions, and many of those decisions involve one or both of virtualization and containerization technologies. When comparing VMs vs. containers, it is natural to ask, which is more secure? Find out in this e-guide.
Posted: 08 Feb 2021 | Published: 02 Oct 2019

TechTarget ComputerWeekly.com

Guide to building an enterprise API strategy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Today's businesses run on software, which must interoperate with myriad other software platforms. How can a business offer its data and computing capabilities to potential users without revealing the underlying source code? In this e-guide we explore the benefits of APIs, how to build an API strategy and why it is so important to have one in place.
Posted: 29 Nov 2022 | Published: 29 Nov 2022

TechTarget ComputerWeekly.com

How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER: Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020

Veracode, Inc.

Computer Weekly – 24 November 2020: Covid accelerates tech innovation in the NHS
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of Computer Weekly, we look at the track and trace app, which was redeveloped and enhanced at breakneck speed, and explore how the pandemic has accelerated the roll-out of new technology such as artificial intelligence and video conferencing tools at NHS trusts. We also present some research into how Covid has affected IT spending.
Posted: 08 Feb 2021 | Published: 24 Nov 2020

TechTarget ComputerWeekly.com

Mobile Security Risk Mitigation and Tips for Success
sponsored by Blue Cedar
EGUIDE: Mobile is the new norm, putting mobile app security into the spotlight. In this e-guide discover a different method of approaching mobile security by focusing on data over device, as well as 12 specific tips to conquer mobile security and common problems.
Posted: 13 Jul 2017 | Published: 11 Jul 2017

Blue Cedar

Fundamentals of Endpoint Security: Anti-Malware Protection
sponsored by Citrix
EGUIDE: Access this e-guide to learn about anti-malware protection and how endpoint security technology can prevent malware from infecting end-user computers and corporate networks.
Posted: 29 May 2018 | Published: 29 May 2018

Citrix

Unifying Endpoint Management with Windows 10
sponsored by VMware
EGUIDE: A key pain point for enterprises using Windows 10 is that you need insight into which devices require updates and which already have them. Read this guide to learn about this new unified endpoint management system to empower your employees while simplifying IT's job.
Posted: 07 Feb 2018 | Published: 05 Feb 2018

VMware

How to Overcome Middleware Security Risks
sponsored by Red Hat
EGUIDE: This expert e-guide provides a step-by-step process to secure middleware through application lifecycle management, network security, and security for specific middleware tools and interfaces. Also discover a case study about how the FAA exploited web-oriented open source middleware to improve integration and cut costs.
Posted: 26 Feb 2016 | Published: 22 Feb 2016

Red Hat

Firewall Buyer's Guide
sponsored by Palo Alto Networks
WHITE PAPER: Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Palo Alto Networks

How to Build an Enterprise Application Security Program
sponsored by IBM
EGUIDE: In this e-guide, learn the key steps to building an enterprise application security program to decrease exposure to potential attackers through statics and dynamic application testing.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

IBM