WEBCAST:
This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
WEBCAST:
Access this slidecast to hear Jay Muehoefer, Director of Software Defined Solutions at IBM, discuss the potential IT and business value of a software defined infrastructure.
WEBCAST:
Access this demo to see how you can draw quick insights from social media data using software-defined storage. Learn to analyze this data in near-real time and dynamically manage the data to keep storage costs low.
SOFTWARE DOWNLOAD:
DBAs are tasked with the monumental job of providing an accurate audit trail of SQL Server activities and auditing sensitive data. SQL compliance manager goes beyond traditional approaches with its real-time monitoring and auditing of all data access, updates, data structure modifications and changes to security permissions. Take a test drive now.
SOFTWARE DOWNLOAD:
Having trouble with storage latency issues? SolarWinds® Storage Response Time Monitor free tool tracks those sluggish VMs, shows the top host to datastore total response times and a count of additional high latency offenders.
WEBCAST:
Watch this webcast to find out how you can derive more value from your scrum teams. Find out how to identify, anticipate, and mitigate the challenges to scaling agile development. Plus, learn how to incorporate scrum into the full product lifecycle, from development to operations and insight.
WEBCAST:
This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.