Search Results | Application security
PREV 1...5...8   9   10   11   12   13   14   15   16   17...   20   30   40   50   60...250 NEXT
Sort by:  Most Relevant  |  Date
Which IT security certification should I choose?

Answer  I have overall 17 Years of IT experience on application development and Project / Program Management. In the recent years, my focus is more in to the program management. I am very much interested to get certified on the Information Security / CyberSecurity side, as the focus on the information secur...

Last updated: Jun 26, 2016   2:33 AM GMT   |    Certifications, cybersecurity, IT security
Rapid7 Optimizes Security for Credit Unions

Blog   Credit Union security practitioners leverage Rapid7 to provoke reaction at the board level. Compromised credit cards, remote command-and-control over an ERP system, and administrative access to the payroll database provides for much more compelling discussions than discussing the number of vulnera...

Last updated: Nov 15, 2010   8:11 PM GMT  |  Blog: Harmonizing Regulatory Compliance and Risk Management   |      credit union, CU, cuispa
What is a software defined perimeter?

Blog  Information access and identity management controls have never been more in the data developer news-stream as they are today. Software Defined Networks (SDN) have a massive part to play in terms of the way cloud architectures are now being constructed to operate, many of which will be multi-tenant ...

Last updated: Jul 11, 2018   7:41 AM GMT  |  Blog: CW Developer Network
SpyEye attackers turn to Android phones to steal SMS messages

Blog  SMS-stealing Trojan poses as banking protection but once installed it can intercept text messages, sending them to the attackers command and control server. A new banking Trojan from cybercriminals brandishing the SpyEye toolkit targets users of Android smartphones, tricking victims into install...

Last updated: Sep 13, 2011   3:41 PM GMT  |  Blog: Security Bytes
Google Android apps found to be sharing data

Blog  Here's an interesting story that has recently emerged. It's great to see some useful research into privacy issues and mobile phone applications. By "tainting" private data researchers were able to see exactly what happened to data once it left the confines of a user's mobile phone. Unsurprisingly t...

Last updated: Sep 30, 2010   1:19 PM GMT  |  Blog: Bloor Security   |      Application security, Cell phone, Security
Symantec delays Virtual Security Appliance, VMware makes play

Blog  Value-added resellers (VARs) who want to get into virtual security have a big decision to make: jump in now with one of the smaller vendors already in the market, or wait a while for themajor players to join the party. Symantec was supposed to be one of the first big-name vendors to enter the sp...

Last updated: Aug 21, 2007   5:56 PM GMT  |  Blog: Channel Marker
embedded system security

Blog  Embedded system security is a strategic approach to protecting software running on embedded systems from attack. Continued Quote of the Day "Every minute you plan in advance for the resiliency of your embedded systems, you'll see payoffs of often five- or tenfold. Take your time and do it proper...

Last updated: Jul 30, 2019   8:33 PM GMT  |  Blog: Word of the Day: Tech Definitions from
The $64,000 BYOD security question

Blog  Should we tackle Bring Your Own Device (BYOD) challenges at the front end with users themselves, or at the application and service level closer to the network layer infrastructure that our end points connect to? This is, arguably, the $64,000 BYOD question. The answer (as it always is with things ...

Last updated: Feb 21, 2013   6:25 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Exam 70-622 Pro: Supporting and Troubleshooting Applications on a Windows Vista Client

Blog  Wow! What an exam title, eh? Interestingly, 70-622 also still sports an old-fashioned exam page, too. Along with 70-622, this MCITP exam qualifies those who pass it to earn the MCITP Enterprise Support Technicican credential, however. Together those two exams sum up the requirements for that particu...

Last updated: Nov 12, 2008   4:03 PM GMT  |  Blog: Windows Enterprise Desktop
Fix expensive Web security weaknesses at a lower cost

Blog  Fortify's newFortify on Demand service offers penetration and static testing of binary code with an introductory pricesmaller than the 360 full service.On Demand is essentially the first half of Fortify 360, a security assessmentservice that include penetration, static, runtime and real-ti...

Last updated: Dec 7, 2009   5:53 PM GMT  |  Blog: Software Quality Insights
Android: ghosts in the machine?

Blog   Speaking personally, the fallout from Mobile World Congress sits at three levels. There's the fact that I missed a complete night's sleep due to a crazy early takeoff slot, Vodafone's mWomen initiative to "empower" women in developing nations with mobiles -- and the lack of discussion surrounding s...

Last updated: Feb 21, 2011   10:45 AM GMT  |  Blog: Open Source Insider   |      Uncategorized
Oracle plans 27 security updates Tuesday

Blog  Oracle released an advance bulletin for the Critical Patch Update (CPU) it has planned for Tuesday. If all goes to plan, DBAs are looking at 27 fixes across the database giant's product line. Security vulnerabilities addressed by this Critical Patch Update affect the following products: Oracle...

Last updated: Jan 11, 2008   11:45 AM GMT  |  Blog: Security Bytes
cloud application performance management (CAPM)

Blog  Cloud application performance management (CAPM) is the process of monitoring user experience (UX) for application programs that are running in private and hybrid cloud environments. Continued Quote of the Day "Quality control testing is critical to guaranteeing that cloud applications can meet p...

Last updated: Jun 25, 2018   8:45 PM GMT  |  Blog: Word of the Day: Tech Definitions from
Secure Systems Development Conference - A Must See!

Blog  On Thursday 19th May 2011 I will be speaking at The 2nd International Secure Systems Development Conference in London on the subject of smartphone security, entitled "I own your smart phone (and of course your private life and your business life)" But why is code security so important?The use of com...

Last updated: Apr 27, 2011   5:38 PM GMT  |  Blog: Bloor Security   |      code security, Developers, Hacking
Understanding of cloud computing ERP clearing -- but still foggy

Blog  Organizations have come a long way in their understanding of fast-developing cloud computing applications they know how to evaluate cloud offerings and incorporate them into their IT operations. But knowledge gaps still exist, said John Yeoh, director of research at the Cloud Security Alliance. ...

Last updated: Feb 22, 2018   4:58 PM GMT  |  Blog: TotalCIO   |      Cloud Computing, Cloud ERP, ERP
No silver bullets in virtualisation & containerisation (even with Docker)

Blog  Docker isn't actually everywhere, but the open source software designed to allow a Linux application (and its dependencies) to be packaged as a container has enjoyed massive success recently. Search AWS recently reported that, "AWS Elastic Beanstalk has updated its support for a Linux container tha...

Last updated: Jul 7, 2014   11:37 AM GMT  |  Blog: Open Source Insider   |      Docker
Microsoft Patch Tuesday Update - 14th December 2010

Blog   With this week's Microsoft Patch Tuesday update, we see the largest collection of updates ever delivered by Microsoft in a single Patch Tuesday release with 17 updates having the following rating; 2 Critical, 14 Important and 1 Moderate. Aside from the significant number of Security and Applicati...

Last updated: Dec 16, 2010   11:37 AM GMT  |  Blog: Cliff Saran’s Enterprise blog   |      Application Compatibility, Applications, ChangeBase
Can you answer these questions about cyber security?

Answer  I think some low-life is paying some other low-life some money to target my computer so I want to keep it secure. Can you tell me if the following is correct? The basic concept of hacking a computer over the Internet involves scanning the target's computer for open ports, then searching for applic...

Last updated: Jun 13, 2019   2:15 PM GMT   |    , Cyber security, firewall
Red Hat: the six most common container misconceptions

Blog  This is a special guest post for Computer Weekly written by Lars Herrmann, GM of theintegrated solutions business unit at Red Hat.Herrmann writes specifically for Open Source Insider to detail the six most common misconceptions that have arisen surrounding the subject of 'container' technologies...

Last updated: Aug 19, 2016   6:02 AM GMT  |  Blog: Open Source Insider   |      Red Hat
Cloud development, gone native

Blog  The cloud computing model of service-based application delivery and storage is proving quite popular, or so they say. If we accept this proposition, then we must also embrace the fact that a logical move to more 'cloud-native' tools must also arise. Security-as-a-Service company Alert Logic is f...

Last updated: Aug 6, 2015   6:51 PM GMT  |  Blog: CW Developer Network   |      Uncategorized
PREV 1...5...8   9   10   11   12   13   14   15   16   17...   20   30   40   50   60...250 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: