Search Results | Application security
PREV 1...5...7   8   9   10   11   12   13   14   15   16...   20   30   40   50   60...250 NEXT
Sort by:  Most Relevant  |  Date
Top concerns of System i users in Europe

Blog  Here are the top concerns of European System i users, according to a survey taken by COMMON Europe: Satisfy internal customers Treat data security and confidentiality as a business risk Improve IT security and continuity Receive consistent high quality service and support from vendors Keep the...

Last updated: Jun 25, 2009   1:25 PM GMT  |  Blog: The iSeries Blog
AWS month in review: Security Hub goes live at AWS security conference

Blog  AWS this month hosted its inaugural re:Inforce conference in Boston and used the setting to make AWS Security Hub and Control Tower generally available and to introduce a VPC network security feature. Other AWS developments of note earlier in June included AWS' expansion of Auto Scaling to Amazon R...

Last updated: Jun 28, 2019   6:21 PM GMT  |  Blog: AWS Cloud Cover   |      "Amazon Web Services", Amazon, Cloud Security
Distil Networks: when bad bots feed on API endpoints

Blog  Can we make our mind up about the bots please? One day we're all about the good bots... and then we're straight back to bad bot detection on the next. Distil Networks, Inc. is a player in the (bad) bot detection and mitigation market. The firm's Distil API Security service is designed to protec...

Last updated: Apr 13, 2016   8:34 AM GMT  |  Blog: CW Developer Network   |      API management, Security
Another New Mobile Device Security Cert: GIAC GMOB

Blog  The SANS Global Information Assurance Certification, or GIAC, program is nothing if not forward-looking. Driven by constant input from a cadre of loyal adherents and followers, the GIAC program stays pretty much at the forefront of information security topics, tools, and technologies. That's why upo...

Last updated: Dec 4, 2013   2:50 PM GMT  |  Blog: IT Career JumpStart
Word of the Day: mobile desktop virtualization

Blog  Word of the Day Mobile desktop virtualization is the delivery of a virtual machine (VM) image to run business applications on a tablet or smartphone. To the end user, the software applications on the VM -- as well as the operating system (OS) and the data associated with the applications -- appear ...

Last updated: Jul 23, 2014   4:55 PM GMT  |  Blog: Word of the Day: Tech Definitions from   |      Technology
Sonatype: 1 in 15 open source app components has at least one security vulnerability

Blog  Software supply chain automation company Sonatype is hanging out the flags to celebrate the fact that it has experienced a 300 percent growth in the use of itsNexus Repository over the past three years. The reason for the growth? The firm thinks it is down togrowing concern about security vuln...

Last updated: Jan 20, 2017   9:26 AM GMT  |  Blog: Open Source Insider
VoIPshield Finds Flaws With Microsoft UC

Blog  VoIPshield, a VoIP security solutions company based in Ottawa, Canada, recently discovered vulnerabilities affecting the RTP (Real-time Transport Protocol), a standard data format used for delivery of audio and instant messaging packets over the Internet. Microsoft Office Communications Server 2007,...

Last updated: Nov 14, 2008   2:29 PM GMT  |  Blog: Unified Communications: Click to talk
Cisco - the Security Company of the year?

Blog  I know, I know, could it be true? Could Cisco be chosen as the computer security company of the year? Or has the ISSA just been watching too many Cisco commercials? Well, it is hard to say. Don't get me wrong, I love Cisco hardware. It is rock solid. However, there are a lot of security companies o...

Last updated: May 28, 2008   8:39 PM GMT  |  Blog: David’s Cisco Networking Blog
Application Standards examples continued

Blog  Some examples of application development principles are: Applications should be integrated using standard interoperability methods and protocols. Applications should be designed with Security in mind. Applications should be accessible via Application Programming Interfaces. Applications should be fl...

Last updated: Nov 9, 2008   8:03 PM GMT  |  Blog: Enterprise Architecture: Different Views
Mobile testing strategies

Blog  Mobileapplication developmentis undeniably a hot and growing market and with it comes new challenges for thetest community. This month, SSQ is focusing on mobility testing with a series of tips and stories covering everything from determining scope for your mobile test efforts to implementing ...

Last updated: Oct 13, 2011   9:56 PM GMT  |  Blog: Software Quality Insights
Should I move into the web application security field?

Answer  I am currently working on network security devices like firewall and my work requires me to work 24*7. I want to move into a field where 24*7 is not required. Is web application security a good and relevant field?

Last updated: Jul 18, 2016   12:42 AM GMT   |    Network security, Web application security
Hackers at work: Security testing at STARWEST

Blog  by Jennifer Lent Frank Kim opened his STARWEST Conference session Security Testing: Think Like an Attacker by asking attendees how many of them were familiar with the concept of a cross-site scripting error. Virtually every hand in the room of 60 to 70 test professionals shot up. But when he asked ...

Last updated: Oct 5, 2012   6:03 PM GMT  |  Blog: Software Quality Insights
Breaking websites without touching the application

Blog  Just as there is more than one way to skin a cat, there are many ways to break a web application. When I speak to developers and ask them if they are producing a secure system, the answer I'll get will usually mention validation and SQL Injection and so on. Good stuff. But is it all literally secure...

Last updated: Sep 26, 2008   9:00 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Security management, Web product security
Doing VoIP right, and keeping data in transit safe

Blog  Voice over IP is one of the biggest drivers for new network channel business today, and it isnt slowing down yet. VoIP services are expected to generate over $6 billion in revenue in North America this year, and are projected to grow to $13.3 billion by 2009, according to data from Infonetics Res...

Last updated: Mar 15, 2007   5:55 PM GMT  |  Blog: Channel Marker
Mobile payment applications and PCI DSS

Blog  Markiyan Malko, compliance manager at payment processor Merchant Warehouse dissects the emerging market for mobile payment applications. The Payment Card Industry Security Standards Council recently withdrew the certification for some mobile payment applications and has a new task force investigatin...

Last updated: Apr 6, 2011   1:00 PM GMT  |  Blog: Security Wire Weekly
uTest expands to security and localization testing through crowdsourced services

Blog  Today announced that it is expanding from its traditional focus on functional testing to include a suite of end-to-end testing services that encompass security testing and localization testing. SSQ spoke with uTest CMO Matt Johnston, who said that uTest customers had already begun to request differe...

Last updated: Aug 15, 2011   6:07 PM GMT  |  Blog: Software Quality Insights
The dangers of Web application security research

Blog  Chris Hoff at Rational Security has an interesting post up today on the problems that researchers face when looking for vulnerabilities in Web-based applications. The basic problem boils down to this: Web applications run on remote servers, not on the researcher's machine, which means any misuse of ...

Last updated: Jun 11, 2007   2:57 PM GMT  |  Blog: Security Bytes
Security gets clearer in the cloud when it comes to mobile

Blog  When it comes to deploying cloud-based applications, security is often cited as oneof the chief concerns. But there may be one area in which deploying SaaS applications actually brings peace of mind when it comes to security - deploying applications on mobile devices. Allowing employees to use m...

Last updated: Apr 28, 2010   1:40 AM GMT  |  Blog: SAP Watch
CompTIA Will Launch 2 New Mobility Certs Soon

Blog  According to a news item in the latest newsletter (Certification Watch 9/19/2013), CompTIA plans to launch both of its new mobility-related IT certifications in October of this year. The two certs in question include both the Mobility+ and Mobile App Security+, where the former seeks t...

Last updated: Sep 20, 2013   2:16 PM GMT  |  Blog: IT Career JumpStart
What is application retirement?

Blog  Application retirement is a thing. Of course it is, software applications don't live forever, not even legacy ones. It is sometimes also known as application decommissioning, application sunsetting, application neutering, application big-banging or application euthanasia. Circle of life It's j...

Last updated: Jun 19, 2015   12:19 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
PREV 1...5...7   8   9   10   11   12   13   14   15   16...   20   30   40   50   60...250 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: