Search Results | Application security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...218 NEXT
Sort by:  Most Relevant  |  Date
What is information security management?

Answer  What's the definition of information security management and its application to corporate security?

Last updated: Nov 25, 2014   12:51 AM GMT   |    Information security
Security for application

Answer  How to provide security for an application in WebSphere application server v7 ? I already installed some applications, now i want to provide security for those applications. please help me on this.

Last updated: Oct 15, 2012   8:52 AM GMT   |    WebSphere, WebSphere Application Server
Threat Monitor: An enterprise strategy for Web application security threats

Blog  People Security founder Hugh Thompson reviews the tools and tactics, from routine assessments to Web application firewalls, that are essential to an application security strategy,

Last updated: Oct 1, 2009   7:08 PM GMT  |  Blog: Security Wire Weekly
What factors in security affect the development side of mobile software technologies/tools?

Answer  How does SDK and REST/SOAP provide security in mobile software application?

Last updated: Apr 21, 2016   2:31 AM GMT   |    Mobile, Security
What is F5 BIG-IP Application Security Manager?

Blog  F5 BIG-IP Application Security Manager (ASM) is a Web Application Firewall (WAF) designed to secure Web Applications in virtual software-defined data center (SDDC), managed cloud service environment, public cloud, or traditional data center. F5 BIG-IP Application Security Manager (ASM) empowers Orga...

Last updated: May 4, 2015   4:35 AM GMT  |  Blog: Network technologies and trends   |      Data Center, F5, Public Cloud
Application data security versus network security

Answer  What are the pros and cons of application data security versus network security? Which do you recommend devoting more budget funds to?

Last updated: Dec 22, 2010   9:13 PM GMT   |    Application security, Data Security Program, Network security
Web App Security

Answer  Why HSTS header are not being used even in most secure web applications i.e. banking domains while it is recommended for best security practice?

Last updated: Jul 27, 2016   11:09 AM GMT   |    , Web security
Why use 256 bit encryption instead of 128 bit?

Answer  Why is that 256 bit encryption has become so popular? Isn't 128 bit security enough for most applications?

Last updated: Nov 25, 2013   5:19 PM GMT   |    128-bit encryption, 256-bit encryption, Encryption
Overheard - Application security

Blog   Those who are new to application security may be overwhelmed by the sheer number of assessment options, each with its own aficionados touting the merits of their favorite assessment type. Rohit Sethi and Nish Bhalla, Vulnerability test methods for application security assessments Today's What...

Last updated: Sep 16, 2009   2:45 PM GMT  |  Blog: Overheard: Word of the Day
Assessing the mobile application security threat

Blog  Mike Zusman and Zach Lanier of New York-based security consultancy Intrepidus Group on the growing threat posed by poorly coded mobile applications. Program links: Mobile application flaws a repeat of past mistakes Developers of mobile applications are repeating many of the same coding errors that...

Last updated: Nov 2, 2010   1:48 PM GMT  |  Blog: Security Wire Weekly
Both network and application security are important

Blog  When people think of security testing, they often think about the network layer -- that area outside of the application. However, application security -- security within your application -- is important as well. John Overbaugh explains the difference in his two recent tips. In Boost network securit...

Last updated: Apr 14, 2011   4:22 PM GMT  |  Blog: Software Quality Insights
SWW: Open source Web application firewall

Blog  ModSecurity, the popular open source Web application firewall is getting a new tool that observes and analyzes application traffic and helps establish accepted behavior. In this special edition of Security Wire Weekly, Ivan Ristic, recognized for his work in building the ModSecurity, discusses his n...

Last updated: Aug 18, 2008   6:02 PM GMT  |  Blog: Security Wire Weekly
Security risks with AWS machine learning

Answer  I am interested in the key security risks associated with AWS Machine Learning. IT Domains specific to which I seek information are listed below: Access Control and User Authentication System / Product Security Application Development Network and Infrastructure Security Internet Facing Ap...

Last updated: Aug 2, 2016   10:01 AM GMT   |    AWS, Machine learning, Security
Virtual patching, Web application security

Blog  Web application security expert Ryan Barnett explains why Web servers represent such a fertile ground for hackers, whether developers will begin to create more secure code and the benefits of a technique called virtual patching, which tricks hackers into thinking a Web application has been patched. ...

Last updated: Nov 26, 2008   2:37 PM GMT  |  Blog: Security Wire Weekly
Will cloud applications be certified by IT audit? What kind of applications can we safely offload to the cloud?

Answer  My organization is looking to offload some of our calculation intensive applications to the cloud. We are concerned about security. Between Amazon, Google, and Microsoft (or another vendor), which seems to have the most complete security / data security reputation. Does anyone have any experience ge...

Last updated: Sep 22, 2009   7:29 PM GMT   |    Cloud Applications, Cloud Computing, Cloud Security
Free online training for secure application development this summer

Blog  If you or any members of your team are interested in improving application security and strategies you can use to ensure secure coding and development of your applications, one convenient and accessible training option is a new online series from Security Innovation via theirtraining library TeamP...

Last updated: Jul 19, 2011   2:11 PM GMT  |  Blog: Software Quality Insights
Advantage to expand IT networks to enable physical security applications like IP video

Answer  A questions emailed to us Is there a clear advantage and ROI to expand IT networks to enable physical security applications such as IP video. These applications typically require significant bandwidth resources.

Last updated: Feb 6, 2008   4:47 PM GMT   |    Physical security, Security

Answer  What security measures are considered when designing a web-application (besides the SSL encryption)? And what technologies are used to protect the application from brute-force, phishing, and pharming attacks."

Last updated: Jun 24, 2008   7:30 AM GMT   |    Risk management, Security protocols, Web security
Web app security mythbusters

Blog  There are many misconceptions and myths about application security, and Cenzic is looking to debunk them in its new mythbuster podcast series. In its first podcast, Cenzic, a provider of Web application security solutions, talks with Jason Lam, a SANS instructor, about topics such as the ability of...

Last updated: Sep 22, 2008   4:07 PM GMT  |  Blog: Software Quality Insights   |      SMTP
firefox browser

Answer  Could not initialize the application's security component. The most likely cause is problems with files in your application's profile directory. Please check that this directory has no read/write restrictions and your hard disk is not full or close to full. It is recommended that you exit the applic...

Last updated: Feb 8, 2014   12:56 AM GMT   |    opening EXE
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...218 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: