Buffer Overflows Reports

Infographic: How blockchain works
sponsored by TechTarget ComputerWeekly.com
EGUIDE: To get a solid understanding of how to use blockchain in an enterprise setting, CIOs must first grasp how a unit of value in a transaction moves from party A to party B. This infographic details how blockchain works from transaction initiation, through verification, all the way to delivery.
Posted: 08 Feb 2021 | Published: 17 Sep 2019

TechTarget ComputerWeekly.com

A guide to developing modern mobile applications
sponsored by TechTarget ComputerWeekly.com
EBOOK: A key ingredient of eBusiness is the ability to offer customers the very best user experience, irrespective of whether they use a web browser, a mobile browser or a mobile app. In this guide, we explore the challenges organisations face in managing the numerous ways customers can transact with businesses.
Posted: 08 Feb 2022 | Published: 08 Feb 2022

TechTarget ComputerWeekly.com

12 API security best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: As more businesses enable access to data and services through APIs, these vectors present an attractive target for data theft and software attacks. Insecure APIs are a serious threat - the following 12 best practices can help expand and elevate the security of an organization's APIs.
Posted: 14 Feb 2023 | Published: 14 Feb 2023

TechTarget ComputerWeekly.com

How to Secure Mobile Applications in a Private Cloud
sponsored by IBM
EGUIDE: In this expert e-guide, uncover the benefits and challenges of creating a private app store to control and monitor the delivery of properly secured mobile applications.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

Five Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: Access this white paper to learn the five principles that solutions seeking to integrate application security into DevOps and CI/CD must address.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Building a Strong Application Security Program
sponsored by Onapsis
EGUIDE: What are the first steps to creating a strong app security program, and how do you know you've struck the right balance between static and dynamic testing? These are the types of questions we explore in this e-guide. Find out what role education is playing in building an app security program and get advice for mitigating SAP vulnerabilities.
Posted: 12 Sep 2016 | Published: 09 Sep 2016

Onapsis

Cybersecurity skills shortage demands new workforce strategies
sponsored by IBM
EGUIDE: The race to find InfoSec professionals who can outpace advanced threats has companies worldwide facing hurdles. This e-guide discusses organizations' want for better qualified candidates and reveals what skills exactly most security professionals are currently lacking.
Posted: 23 Jun 2016 | Published: 21 Jun 2016

IBM

DevSecOps delivers better business
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

TechTarget ComputerWeekly.com

Malware Hitching a Ride on Mobile Apps?
sponsored by TechTarget Security
EBOOK: The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
Posted: 27 Jun 2016 | Published: 20 Jun 2016

TechTarget Security

5 Post-Hot Patch App Ban Risks and the Value of Security Assessments
sponsored by Blue Cedar
EGUIDE: Discover the value of application assessments when determining security risk, and 5 areas that need to be considered for enterprise app security in the face of Apple's decision to ban hot patches.
Posted: 13 Jul 2017 | Published: 11 Jul 2017

Blue Cedar