Threat Stack

Results: 14



#Item
1Computing / Software / Software bugs / Programming language implementation / Subroutines / Portable Executable / Position-independent code / Object file / Dynamic linker / Stack buffer overflow / Buffer overflow / Return-to-libc attack

Retrospective Protection utilizing Binary Rewriting Sergej Proskurin, Fatih Kilic, Claudia Eckert1 Abstract: Buffer overflow vulnerabilities present a common threat. To encounter this issue, operating system support and

Add to Reading List

Source URL: www.sec.in.tum.de

Language: English - Date: 2015-06-23 06:38:59
2Computing / Cloud computing / Security / Computer network security / Computer security / Stack / Threat

CA S E S T U DY SIMPLE FINANCE TECHNOLOGY COMPA NY Simple Finance Technology Company is reinventing online banking with modern web and mobile experiences, no surprise fees, and great customer service. Simple provides cu

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-03-07 11:06:45
3Computing / Security / Cyberwarfare / Computer security / Computer network security / Crime prevention / National security / Secure communication / Threat Stack / Threat / Cloud computing security / Cloud computing

T HR E AT STACK + AMAZON IN SP ECTO R REA C H I NG CLO UD SEC U RI T Y IN DE P TH & SC A L E Achieve Stronger Security in the Cloud

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-03-16 05:52:51
4Cloud infrastructure / Computer security / Computer network security / Web hosting / Cloud computing / Amazon Web Services / Threat Stack / Threat / Stack / Cloud computing issues / Eucalyptus

Implementing high-velocity security best practices. A STEP-BY-STEP GUIDE TO

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-03-07 11:09:10
5Cloud infrastructure / Cloud applications / System administration / Cloud Computing / Cloud Computing Security / Threat Stack / Docker / Amazon Elastic Compute Cloud / Computer security / Vulnerability / Amazon Web Services

TH RE AT STA CK C LO UD SE C UR ITY P L AT FO RM T M PRO EDITION Integrate with your process. Our Pro edition provides the ultimate experience and flexibility in workload security.

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-03-16 05:37:16
6Computing / Security / Cyberwarfare / Computer security / Computer network security / Crime prevention / National security / Secure communication / Threat Stack / Threat / Cloud computing security / Cloud computing

T HR E AT STACK + AMAZON IN SP ECTO R REA C H I NG CLO UD SEC U RI T Y IN DE P TH & SC A L E Achieve Stronger Security in the Cloud

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-02-17 08:56:28
7Computing / Cloud computing / Cloud infrastructure / Cloud computing security / Threat Stack / Health Insurance Portability and Accountability Act / Computer security / Amazon Web Services / Logicworks / Cloud computing issues

CON TI N U O U S MO N ITO RIN G A BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD Healthcare companies utilizing cloud infrastructure require continuous security monitoring. Learn how to prevent da

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-02-02 12:48:38
8Computing / Security / Cloud computing / E-commerce / Secure communication / Crime prevention / National security / Cloud infrastructure / Payment Card Industry Data Security Standard / Threat Stack / Computer security / Stack

SO LU TIO N B RIEF SECURITY SOLUTIONS FOR PCI DSS AND PII The media and publishing industry’s increasing migration to and expansion in the cloud means you’re tasked with minimizing risk and ensuring compliance throu

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-02-02 12:48:42
9Security / Computer security / Prevention / Computing / E-commerce / Cryptography / Computer network security / National security / Payment Card Industry Data Security Standard / Cloud computing security / Information security / Threat

P CI D S S CO MP LIA N CE ACHIEVING PCI DSS COMPLIANCE WITH THREAT STACK The protection of your customers’ payment information is paramount to your business’ survival. In the cloud, the level of security required to

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-03-16 06:02:32
10Computing / Cloud computing / Security / Computer network security / Computer security / Stack / Threat

CA S E S T U DY SIMPLE FINANCE TECHNOLOGY COMPA NY Simple Finance Technology Company is reinventing online banking with modern web and mobile experiences, no surprise fees, and great customer service. Simple provides cu

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-02-15 16:22:01
UPDATE