Search Results | Application security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...249 NEXT
Sort by:  Most Relevant  |  Date
Both network and application security are important

Blog  When people think of security testing, they often think about the network layer -- that area outside of the application. However, application security -- security within your application -- is important as well. John Overbaugh explains the difference in his two recent tips. In Boost network securit...

Last updated: Apr 14, 2011   4:22 PM GMT  |  Blog: Software Quality Insights
What is F5 BIG-IP Application Security Manager?

Blog  F5 BIG-IP Application Security Manager (ASM) is a Web Application Firewall (WAF) designed to secure Web Applications in virtual software-defined data center (SDDC), managed cloud service environment, public cloud, or traditional data center. F5 BIG-IP Application Security Manager (ASM) empowers Orga...

Last updated: May 4, 2015   4:35 AM GMT  |  Blog: Network technologies and trends   |      Data Center, F5, Public Cloud
Free online training for secure application development this summer

Blog  If you or any members of your team are interested in improving application security and strategies you can use to ensure secure coding and development of your applications, one convenient and accessible training option is a new online series from Security Innovation via theirtraining library TeamP...

Last updated: Jul 19, 2011   2:11 PM GMT  |  Blog: Software Quality Insights
OWASP

Blog  The Open Web Application Security Project (OWASP) is a not-for-profit group that helps organizations develop, purchase, and maintain software applications that can be trusted. Continued Quote of the Day "OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire...

Last updated: Feb 2, 2018   3:41 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
SANS Adds Web App Pen Test Cert to Line-Up

Blog  For yet another sign that Web-based applications are growing in importance and use, the SANS Global Information Assurance Certification (GIAC) program has added a new credential to its line-up. The GIAC Web Application Penetration Tester, or GWAPT, seeks to train security professionals to analyze an...

Last updated: Oct 18, 2013   1:58 PM GMT  |  Blog: IT Career JumpStart
HP to acquire Fortify software

Blog   Fortify Software is company which creates software for security testing of application through all stages of the development process through development, Fortify is a privately held software security assurance company based in San Mateo, Calif. Already HP and Fortify software have collaborate...

Last updated: Aug 24, 2010   7:10 AM GMT  |  Blog: Network technologies and trends
Web app security mythbusters

Blog  There are many misconceptions and myths about application security, and Cenzic is looking to debunk them in its new mythbuster podcast series. In its first podcast, Cenzic, a provider of Web application security solutions, talks with Jason Lam, a SANS instructor, about topics such as the ability of...

Last updated: Sep 22, 2008   4:07 PM GMT  |  Blog: Software Quality Insights   |      SMTP
application whitelisting

Blog  Application whitelisting is the practice of specifying an index of approved software applications that are permitted to be present and active on a computer system. Continued... Quote of the Day "With application whitelisting, admins can create a list of approved apps users can work with. This way, ...

Last updated: Jul 31, 2018   9:32 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
IBM announces new cloud security services

Blog  IBM is selling professional services, hosted security event and log management technology and a hosted vulnerability management service. IBM announced this week new professional and technology security services aimed at organizations' cloud computing efforts. The announcements follow the results of...

Last updated: Oct 21, 2010   1:37 PM GMT  |  Blog: Security Bytes
Security risks with AWS machine learning

Answer  I am interested in the key security risks associated with AWS Machine Learning. IT Domains specific to which I seek information are listed below: Access Control and User Authentication System / Product Security Application Development Network and Infrastructure Security Internet Facing Ap...

Last updated: Aug 2, 2016   10:01 AM GMT   |    AWS, Machine learning, Security
SWW: Open source Web application firewall

Blog  ModSecurity, the popular open source Web application firewall is getting a new tool that observes and analyzes application traffic and helps establish accepted behavior. In this special edition of Security Wire Weekly, Ivan Ristic, recognized for his work in building the ModSecurity, discusses his n...

Last updated: Aug 18, 2008   6:02 PM GMT  |  Blog: Security Wire Weekly
Did you see this? - 2007 Web Application Security Statistics Project

Blog   The Web Application Security Consortium (WASC) is pleased to announce the WASC Web Application Security Statistics Project 2007. This initiative is a collaborative industry wide effort to pool together sanitized website vulnerability data and to gain a better understanding about the web applic...

Last updated: Sep 8, 2008   4:49 PM GMT  |  Blog: IT Trenches
Security for application

Answer  How to provide security for an application in WebSphere application server v7 ? I already installed some applications, now i want to provide security for those applications. please help me on this.

Last updated: Oct 15, 2012   8:52 AM GMT   |    WebSphere, WebSphere Application Server
Docker's oyster has security in the shell

Blog  Goodness isn't it all about the containers these days? Actually, scratch that, isn't it all about the container security debate these days? As recently explained here, a container is a specific place to run an application alongside its own dependencies, configuration files, libraries and the 'runt...

Last updated: Nov 17, 2015   12:15 AM GMT  |  Blog: Open Source Insider   |      Docker, Security
New security threat: Custom applications in the cloud

Blog  The average organization today develops 464 custom applications -- some running functions critical to the business -- and puts a lot of the software in the public cloud. IT security is in the dark about nearly two-thirds of these applications, according to new research released this week from nonpro...

Last updated: Feb 17, 2017   4:44 PM GMT  |  Blog: TotalCIO
Visa pushes application security

Blog  Visa USA is making progress on its effort to improve payment application security. As of last month, 155 products across 80 vendors have been validated by qualified assessors as meeting Visa's Payment Application Best Practices (PABP), said Hap Huynh, Visa USA information security specialist. Speak...

Last updated: May 21, 2007   4:41 PM GMT  |  Blog: Security Bytes
Citrix XenApp may seem complex, but streamlines security management

Blog  Editors Note: Eric Ogren, a frequent contributor to SearchSecurity.com, is guest blogging today. Ogren is founder and principal analyst of the Ogren Group, which provides industry analyst services for vendors focusing on virtualization and security. He can be reached by sending an email to eric@o...

Last updated: Apr 17, 2009   2:56 PM GMT  |  Blog: Security Bytes
Overheard - Application security

Blog   Those who are new to application security may be overwhelmed by the sheer number of assessment options, each with its own aficionados touting the merits of their favorite assessment type. Rohit Sethi and Nish Bhalla, Vulnerability test methods for application security assessments Today's What...

Last updated: Sep 16, 2009   2:45 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
Application Protection - Part III

Blog  FCPA control measures for an adequate system of internal accounting controls include maintaining appropriate segregation of duties, allowing only authorized transaction execution, controlling access to assets, and reconciling documented assets to actual assets regularly. Completeness, accuracy, auth...

Last updated: Jun 19, 2009   1:09 PM GMT  |  Blog: IT Governance, Risk, and Compliance
Web application security more important than ever

Blog  Discussing Web security with even the nicest security professionals can leave one feeling chilled to the bone. It's not the fault of the security people -- it's just chilling to be reminded how vulnerable the Web really is. Jeremiah Grossman Recently, I spoke with Jeremiah Grossman ...

Last updated: Oct 3, 2008   2:51 PM GMT  |  Blog: Software Quality Insights
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...249 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: