Buffer Overflows Reports

SAST vs. DAST: What Are the Differencesand Why Are They Both Important?
sponsored by Veracode, Inc.
RESOURCE: If you only use SAST, you miss out on detecting critical flaws from open source vulnerabilities and configuration errors. The more application security scan types you employ, the more flaws you uncover. This infographic dives deeper into the differences between SAST and DAST, and establishes the benefits of using both scan types in unison.
Posted: 19 Mar 2021 | Published: 19 Mar 2021

Veracode, Inc.

Using digital twins to cut costs and improve safety at Shell
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at Shell's digital twin strategy, which combines AI, internet of things and big data to improve safety and cut costs. Our latest buyer's guide examines the best practices and technologies in business process automation. And we find out why securing DNS is critical to fighting cyber crime. Read the issue now.
Posted: 08 Feb 2021 | Published: 10 Nov 2020

TechTarget ComputerWeekly.com

The Evolution of Network Security Hardware
sponsored by Aruba Networks
EGUIDE: This e-guide examines in detail how the basics of network security have changed since its inception. Learn about the 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months, and also how to make sure your Wi-Fi deployment is secure.
Posted: 01 Mar 2016 | Published: 24 Feb 2016

Aruba Networks

Are You Ready for RASP?
sponsored by TechTarget Security
EBOOK: This runtime application self-protection handbook covers the basics and offers advice on RASP implementation for IT security professionals.
Posted: 24 Oct 2016 | Published: 21 Oct 2016

TechTarget Security

Antimalware Protection and the Fundamentals of Endpoint Security
sponsored by OPSWAT inc
EGUIDE: In this expert e-guide, uncover the key features of endpoint antimalware protection, as well as how to deploy/manage endpoint antimalware tools.
Posted: 31 Aug 2017 | Published: 29 Aug 2017

All resources sponsored by OPSWAT inc

Information Security Magazine: November Issue
sponsored by TechTarget Security
EZINE: What strategies are companies using to protect data against mobile security threats? In Information Security, we ask CISOs who have been there: What works?
Posted: 02 Nov 2015 | Published: 02 Nov 2015

TechTarget Security

Mobile Security Risk Mitigation and Tips for Success
sponsored by Blue Cedar
EGUIDE: Mobile is the new norm, putting mobile app security into the spotlight. In this e-guide discover a different method of approaching mobile security by focusing on data over device, as well as 12 specific tips to conquer mobile security and common problems.
Posted: 13 Jul 2017 | Published: 11 Jul 2017

Blue Cedar

Modern Mobility E-zine: In-App Analytics Get Down to Business
sponsored by TechTarget Mobile Computing
EZINE: In this issue of Modern Mobility, delve straight into in-app analytics, and learn how the insights this technology provides will keep mobile applications on track. Access this exclusive e-zine now to learn more about mobile backend as a service, and how to build apps that connect to data center infrastructure.
Posted: 13 Oct 2015 | Published: 13 Oct 2015

TechTarget Mobile Computing

The Evolution of ADC
sponsored by Citrix
EGUIDE: Explore the companies that offer the broadest selection of ADC features, and learn about the evolution of ADCs as demands have changed.
Posted: 23 May 2018 | Published: 22 May 2018

Citrix

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.