Search Results | Application security
PREV 1...5...6   7   8   9   10   11   12   13   14   15...   20   30   40   50   60...252 NEXT
Sort by:  Most Relevant  |  Date
Security boost for LAMP stack

Blog  LAMP, an open-source Web development platform based on Linux, Apache, MySQL, and PHP, is getting some added protection from attacks thanks to Metaforic. Metaforic, a provider of anti-tamper solutions, announced that upon request it will provide free versions of secured Apache and MySQL to enterpris...

Last updated: Dec 10, 2008   4:03 PM GMT  |  Blog: Software Quality Insights
AVG is programmed for mobile DroidSecurity

Blog   AVG Technologies has added Tel Aviv-based DroidSecurity to its acquisition knapsack in an open source flavoured move to provide cloud-based mobile security for smartphones, tablets and other devices running on Google's Android operating system. Now under the AVG anti virus wing, DroidSecurity is s...

Last updated: Nov 10, 2010   5:10 PM GMT  |  Blog: CW Developer Network   |      Uncategorized
AJAX platform injects security

Blog  Kyle Adams and Al Huizenga of new startup Mykonos talk about their new platform that injects security into the software development lifecycle for AJAX applications. Also, security expert David Mortman on cloud computing.

Last updated: Apr 23, 2009   3:43 PM GMT  |  Blog: Security Wire Weekly
Study shows most bank Web sites have serious security design flaws

Blog  A new study from researchers at the University of Michigan reveals that 76% of more than 200 bank websites had at least one security design flaw.This is truly shocking news. I had to go back and read the results a couple of times just to make sure I had it right. I could not believe that 24% of the ...

Last updated: Jul 24, 2008   2:51 PM GMT  |  Blog: Security Bytes
Credit union warns of phony banking Android app

Blog  Mobile banking app tries to gain access to financial data. App removed from Android marketplace. In what could be one of the first signs that attackers are testing smartphones as another way to gain access to sensitive information, a Beaverton, Oregon credit union is warning its customers about a r...

Last updated: Jan 11, 2010   2:09 PM GMT  |  Blog: Security Bytes
Big data or big security buzz word?

Blog  Pete Lindstrom of Spire Security joins the editorial team in a discussion about the themes that emerged at RSA Conference 2012. Big data resonated at this year's conference, but what does it mean? Also, the team talks about the specter of mobile security and whether application security gets oversha...

Last updated: Mar 8, 2012   1:10 PM GMT  |  Blog: Security Wire Weekly
dynamic link library (DLL)

Blog  A dynamic link library (DLL) is a collection of small programs that can be loaded when needed by larger programs and used at the same time. Continued Quote of the Day "Just like executable files, DLL files can contain code, data and resources, such as images, but they can be used by more than ...

Last updated: Aug 2, 2017   8:07 PM GMT  |  Blog: Word of the Day: Tech Definitions from   |      Application virtualization, DLL
Where do we spend the money?

Blog  I was involved in a debate today where three opposing views were being taken with regards to implementing a hypothetical new online application. Given a limited budget, should most of the money be directed towards network, application or data security? Personally I believe that a more&nbs...

Last updated: Jul 31, 2008   9:41 PM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Network security, Security management, Web product security
Ixia - Key Highlights of Ixia's Solutions To Support Network and Security

Blog  What are the key highlights of Ixia's solutions? Ixia delivers a powerful combination of innovative solutions and trusted insight to support network and security products, from concept to operation. Whether preparing for the product launch, deploying an application, or managing a product in operatio...

Last updated: Aug 10, 2017   7:49 AM GMT  |  Blog: Quality Assurance and Project Management   |      Ixia, Network security
Kubernetes flaw shows API security is no set & forget deal

Blog  When a report surfaced last month detailing a severe vulnerability in Kubernetes, the popular, open-source software for managing Linux applications deployed within containers, many of us will have wondered what the deeper implications of this alleged flaw could mean. Although the flaw was qui...

Last updated: Jan 15, 2019   6:45 AM GMT  |  Blog: Open Source Insider
Web security in an always-on world

Blog   My habits are not dissimilar to those of many others. In the morning, my first act is to collect my phone from beside the bed, check my email accounts and then look to see who has posted what on Facebook and Twitter. All these services are based in the cloud, accessed directly via the internet. But...

Last updated: Feb 14, 2011   3:17 PM GMT  |  Blog: Bloor Security   |      Cloud Computing, Data protection, Web security
Black Duck cooks up extra security sauce

Blog  Black Duck has createda Centre for Open Source Research & Innovation (COSRI) at itsMassachusetts headquarters. The firm is a specialist in 'automated' software for securing and managing open source. Europe-based BlackDuckSecurity Research analyses security issues and attack patterns in ...

Last updated: Aug 8, 2016   8:03 AM GMT  |  Blog: Open Source Insider
Oracle preps CPU for 41 flaws

Blog  Oracle said Thursday that it is prepping a Critical Patch Bulletin (CPU) to address 41 security holes across its product line. According to the database giant's advance CPU bulletin, attackers could exploit themost severe flaws to compromise the database server or the host operating system. Affec...

Last updated: Apr 11, 2008   2:12 PM GMT  |  Blog: Security Bytes
Why You Should Replace or Enhance Your Legacy VPN with a Software-Defined Perimeter (SDP) Solution

Blog  As has been the case for many decades, innovative new applications are entering the marketplace on a regular basis to support the ever-changing way we do business, interact with customers, and interact with each other. While developments in areas such as cloud, AI, machine learning, IoT, edge, mobil...

Last updated: Jul 2, 2019   10:31 AM GMT  |  Blog: Quality Assurance and Project Management   |      DH2i, SDP, VPN
Cisco's free iPhone app grabs security feeds

Blog  Cisco's offering of the Security Intelligence Operations (SIO) to go iPhone application is specifically made for security concerns and it's FREE. Michael Weir, manager of Cisco security says, ... it let's users select from a range of information, including risk reports or news-related events. Che...

Last updated: Nov 28, 2009   6:28 PM GMT  |  Blog: David’s Cisco Networking Blog
Blue Skies Ahead A New Paradigm for Cloud Security

Blog  Question:Cloud security is still a major concern for IT and Business executives. Are there emerging security products that address the unique challenges of the cloud? Progress has been made; business executives no longer give security as the primary reason for not implementing cloud architecture...

Last updated: Sep 18, 2011   4:30 PM GMT  |  Blog: Ask the IT Consultant
Getting down with WCF security

Blog  By Andrew Horne Authentication and authorization are key areas of focus in the "Improving Web Services Security" guide published by Microsofts Patterns and Practices Team. The guide leads you through SOA security, WCF security, and useful application scenarios for both internet and intranet. Th...

Last updated: Aug 13, 2008   6:49 PM GMT  |  Blog: .NET Developments
LANDesk gets ready to join host of host-based intrusion detectors

Blog   LANDesk is getting ready to announce an addition to its lineup of systems management and security products. On April 29 the company plans to announce a Host-Based Intrusion Prevention System (HIPS) that will plug into the administration console and function as a part of its overall Security Suite....

Last updated: Apr 17, 2007   9:00 PM GMT  |  Blog: Channel Marker
The new standard for IoT security

Blog  It's undeniable that the internet of things will continue growing in popularity across a wide array of industries. More and more applications will begin to deploy wireless sensor networks as part of their products, services or operations, making it imperative for organizations to increase their focu...

Last updated: Mar 28, 2019   4:17 PM GMT  |  Blog: IoT Agenda   |      Authentication, Data-security, Internet of Things
VoIP toll fraud on the rise

Blog  Sipera Systems, a unified communications security specialist, says it has seen a rise in toll fraud among enterprsies and service providers that it uncovers during the security architecture reviews and product deployments it has done in recent months. Sipera said these cases of toll fraud of cost o...

Last updated: Jun 11, 2009   8:15 PM GMT  |  Blog: Unified Communications Nation
PREV 1...5...6   7   8   9   10   11   12   13   14   15...   20   30   40   50   60...252 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: