Search Results | Application security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...227 NEXT
Sort by:  Most Relevant  |  Date
What is information security management?

Answer  What's the definition of information security management and its application to corporate security?

Last updated: Nov 25, 2014   12:51 AM GMT   |    Information security
Security for application

Answer  How to provide security for an application in WebSphere application server v7 ? I already installed some applications, now i want to provide security for those applications. please help me on this.

Last updated: Oct 15, 2012   8:52 AM GMT   |    WebSphere, WebSphere Application Server
Threat Monitor: An enterprise strategy for Web application security threats

Blog  People Security founder Hugh Thompson reviews the tools and tactics, from routine assessments to Web application firewalls, that are essential to an application security strategy,

Last updated: Oct 1, 2009   7:08 PM GMT  |  Blog: Security Wire Weekly
What factors in security affect the development side of mobile software technologies/tools?

Answer  How does SDK and REST/SOAP provide security in mobile software application?

Last updated: Apr 21, 2016   2:31 AM GMT   |    Mobile, Security
What is F5 BIG-IP Application Security Manager?

Blog  F5 BIG-IP Application Security Manager (ASM) is a Web Application Firewall (WAF) designed to secure Web Applications in virtual software-defined data center (SDDC), managed cloud service environment, public cloud, or traditional data center. F5 BIG-IP Application Security Manager (ASM) empowers Orga...

Last updated: May 4, 2015   4:35 AM GMT  |  Blog: Network technologies and trends   |      Data Center, F5, Public Cloud

Answer  What security measures are considered when designing a web-application (besides the SSL encryption)? And what technologies are used to protect the application from brute-force, phishing, and pharming attacks."

Last updated: Jun 24, 2008   7:30 AM GMT   |    Risk management, Security protocols, Web security
Application data security versus network security

Answer  What are the pros and cons of application data security versus network security? Which do you recommend devoting more budget funds to?

Last updated: Dec 22, 2010   9:13 PM GMT   |    Application security, Data Security Program, Network security
Web App Security

Answer  Why HSTS header are not being used even in most secure web applications i.e. banking domains while it is recommended for best security practice?

Last updated: Jul 27, 2016   11:09 AM GMT   |    , Web security
Why use 256 bit encryption instead of 128 bit?

Answer  Why is that 256 bit encryption has become so popular? Isn't 128 bit security enough for most applications?

Last updated: Nov 25, 2013   5:19 PM GMT   |    Encryption
Overheard - Application security

Blog   Those who are new to application security may be overwhelmed by the sheer number of assessment options, each with its own aficionados touting the merits of their favorite assessment type. Rohit Sethi and Nish Bhalla, Vulnerability test methods for application security assessments Today's What...

Last updated: Sep 16, 2009   2:45 PM GMT  |  Blog: Word of the Day: Tech Definitions from
Security risks with AWS machine learning

Answer  I am interested in the key security risks associated with AWS Machine Learning. IT Domains specific to which I seek information are listed below: Access Control and User Authentication System / Product Security Application Development Network and Infrastructure Security Internet Facing Ap...

Last updated: Aug 2, 2016   10:01 AM GMT   |    AWS, Machine learning, Security
SWW: Open source Web application firewall

Blog  ModSecurity, the popular open source Web application firewall is getting a new tool that observes and analyzes application traffic and helps establish accepted behavior. In this special edition of Security Wire Weekly, Ivan Ristic, recognized for his work in building the ModSecurity, discusses his n...

Last updated: Aug 18, 2008   6:02 PM GMT  |  Blog: Security Wire Weekly
Both network and application security are important

Blog  When people think of security testing, they often think about the network layer -- that area outside of the application. However, application security -- security within your application -- is important as well. John Overbaugh explains the difference in his two recent tips. In Boost network securit...

Last updated: Apr 14, 2011   4:22 PM GMT  |  Blog: Software Quality Insights
Assessing the mobile application security threat

Blog  Mike Zusman and Zach Lanier of New York-based security consultancy Intrepidus Group on the growing threat posed by poorly coded mobile applications. Program links: Mobile application flaws a repeat of past mistakes Developers of mobile applications are repeating many of the same coding errors that...

Last updated: Nov 2, 2010   1:48 PM GMT  |  Blog: Security Wire Weekly
Virtual patching, Web application security

Blog  Web application security expert Ryan Barnett explains why Web servers represent such a fertile ground for hackers, whether developers will begin to create more secure code and the benefits of a technique called virtual patching, which tricks hackers into thinking a Web application has been patched. ...

Last updated: Nov 26, 2008   2:37 PM GMT  |  Blog: Security Wire Weekly
Will cloud applications be certified by IT audit? What kind of applications can we safely offload to the cloud?

Answer  My organization is looking to offload some of our calculation intensive applications to the cloud. We are concerned about security. Between Amazon, Google, and Microsoft (or another vendor), which seems to have the most complete security / data security reputation. Does anyone have any experience ge...

Last updated: Sep 22, 2009   7:29 PM GMT   |    Cloud Applications, Cloud Computing, Cloud Security
Free online training for secure application development this summer

Blog  If you or any members of your team are interested in improving application security and strategies you can use to ensure secure coding and development of your applications, one convenient and accessible training option is a new online series from Security Innovation via theirtraining library TeamP...

Last updated: Jul 19, 2011   2:11 PM GMT  |  Blog: Software Quality Insights
application whitelisting

Blog  Application whitelisting is the practice of specifying an index of approved software applications that are permitted to be present and active on a computer system. Continued... Quote of the Day "With application whitelisting, admins can create a list of approved apps users can work with. This way, ...

Last updated: Jul 31, 2018   9:32 PM GMT  |  Blog: Word of the Day: Tech Definitions from
Web app security mythbusters

Blog  There are many misconceptions and myths about application security, and Cenzic is looking to debunk them in its new mythbuster podcast series. In its first podcast, Cenzic, a provider of Web application security solutions, talks with Jason Lam, a SANS instructor, about topics such as the ability of...

Last updated: Sep 22, 2008   4:07 PM GMT  |  Blog: Software Quality Insights   |      SMTP
Did you see this? - 2007 Web Application Security Statistics Project

Blog   The Web Application Security Consortium (WASC) is pleased to announce the WASC Web Application Security Statistics Project 2007. This initiative is a collaborative industry wide effort to pool together sanitized website vulnerability data and to gain a better understanding about the web applic...

Last updated: Sep 8, 2008   4:49 PM GMT  |  Blog: IT Trenches
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...227 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: