Buffer Overflows Reports

Using digital twins to cut costs and improve safety at Shell
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.
Posted: 08 Feb 2021 | Published: 10 Nov 2020

TechTarget ComputerWeekly.com

Application security: best practices and risks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
Posted: 08 Feb 2021 | Published: 21 Oct 2019

TechTarget ComputerWeekly.com

Key software development trends to drive business success
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, you will learn more about leveraging DevOps to automate processes between development and IT teams, the importance of testing to keep internet of things devices safe from prying eyes and how one company has made use of open source software to automate the roll-out of application changes.
Posted: 08 Feb 2021 | Published: 09 Oct 2017

TechTarget ComputerWeekly.com

Top DevSecOps certifications for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Check out some of the top DevSecOps certifications and trainings that can help professionals learn how to shift security left in the software development lifecycle.
Posted: 25 May 2022 | Published: 25 May 2022

TechTarget ComputerWeekly.com

Modern Mobility E-zine: In-App Analytics Get Down to Business
sponsored by TechTarget Mobile Computing
EZINE: In this issue of Modern Mobility, delve straight into in-app analytics, and learn how the insights this technology provides will keep mobile applications on track. Access this exclusive e-zine now to learn more about mobile backend as a service, and how to build apps that connect to data center infrastructure.
Posted: 13 Oct 2015 | Published: 13 Oct 2015

TechTarget Mobile Computing

Comprehensive Data Security In The Cloud
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, learn about some common cloud and SaaS application threats, as well as the 3 step guide to protecting your data in this new environment.
Posted: 30 May 2017 | Published: 30 May 2017

Palo Alto Networks

What to Look for in Vulnerability Management
sponsored by TechTarget Security
EBOOK: This Buyer's Essentials guide helps InfoSec pros, like you, assess and purchase vulnerability management tools. It explains how they work and highlights key features you should look for.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

TechTarget Security

How To Build An Enterprise Application Security Program
sponsored by Symantec + Blue Coat
EGUIDE: Building an effective application security program can seem daunting – but it doesn't have to be. In this e-guide, experts detail the first steps enterprises should take, and why education and training are key to the success of these programs.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

Symantec + Blue Coat

How to Resolve a Web Application Security Vulnerability
sponsored by Veracode, Inc.
EGUIDE: Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.
Posted: 22 May 2017 | Published: 18 May 2017

Veracode, Inc.

Building an Application Security Program: Why Education is Key
sponsored by tCell
EGUIDE: Gain insight into what an application security program might look like as it develops and what experts have to say about what it could mean for the future of application development.
Posted: 28 Mar 2017 | Published: 28 Mar 2017

tCell