Search Results | Application security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...249 NEXT
Sort by:  Most Relevant  |  Date
Let's shed some light on the far reaches of application security

Blog  I think it's sort of human nature to be uncomfortable with the unknown and with the things that aren't under our control. That might be one of the reasons so many software quality professionals try to skate around doing security testing. Obviously there are other factors getting caught up in pre...

Last updated: Sep 13, 2013   11:42 PM GMT  |  Blog: Software Quality Insights
Podcast: OWASP's Hess on security and compliance in the cloud

Blog  Todays episode features an interview with Georg Hess about Web application security and compliance in the cloud. Hess is the founder of application security provider Art of Defence and current German chapter head of the Open Web Application Security Project (OWASP). The OWASP membership includes...

Last updated: May 18, 2009   12:58 AM GMT  |  Blog: IT Compliance Advisor
Competitors laud Cisco acquisition of Web-services accelerator

Blog   Vendors in the XML applicationacceleration market seem to be applauding Cisco Systems Inc.s acquisition of Reactivity Inc., this week, if only because it validates a broad-based need for appliances that can make complex Web-services based applications run efficiently. Both analysts and vendo...

Last updated: Feb 27, 2007   10:56 PM GMT  |  Blog: Channel Marker
CompTIA Mobile App Security+ Now Live

Blog  Last week, the latest CompTIA certification went live, as the Mobile App Security+ exam became available on October 15. This credential seeks to address the need to develop, test, and deliver native iOS or Android applications (the test comes in two flavors, one for each of these market-leading mobi...

Last updated: Oct 21, 2013   2:46 PM GMT  |  Blog: IT Career JumpStart
Microsoft Patch Tuesday: 13th July 2010

Blog   With this July Microsoft Patch Tuesday Security Update, we see a moderate number of security updates with 4 updates to Windows XP, Windows 7 and Office, including three updates rated as 'Critical' and one rated as 'Important'. Unfortunately, all patched released this month will most likely ...

Last updated: Jul 14, 2010   8:49 AM GMT  |  Blog: Cliff Saran’s Enterprise blog   |      Application Compatibility, Applications, ChangeBase
Microsoft Patch Tuesday: May 11th 2010

Blog   With this May Microsoft Patch Tuesday Security Update, we see a relatively light release with just two security updates this month. Both patches are rated as Critical, with the potential for remote code execution on the target client. Unfortunately, all patches released this month will mo...

Last updated: May 12, 2010   10:07 AM GMT  |  Blog: Cliff Saran’s Enterprise blog   |      Application Compatibility, Applications, ChangeBase
A secure global desktop through HTML5

Blog  Oracle is combining the back end database zone that it is known well for with some front end application-centric advancements hinged around simplified remote access to enterprise apps through HTML5. The firm has announced a new release of Secure Global Desktop. This product that sits as a part of ...

Last updated: May 9, 2013   3:45 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Check Point Integrates FaceTime Web 2.0 Security

Blog  Web 2.0 tools and social networking services offer an increasing challenge for IT and security administrators tasked with balancing the productive flow of communications in real-time with the security risks of leaked and compromised data. Check Point, a leader in network security appliances, has re...

Last updated: Dec 1, 2009   4:45 AM GMT  |  Blog: Unified Communications: Click to talk
PCI DSS application standard will boost security

Blog  There was a major development on the PCI DSS front this week, and it's good news for anyone who has to swipe a credit card at the cashier counter or punch in a credit card number during online purchases. In other words, it's good news for just about everyone. To force more security into the payment...

Last updated: Nov 8, 2007   6:00 PM GMT  |  Blog: Security Bytes
Virtual patching, Web application security

Blog  Web application security expert Ryan Barnett explains why Web servers represent such a fertile ground for hackers, whether developers will begin to create more secure code and the benefits of a technique called virtual patching, which tricks hackers into thinking a Web application has been patched. ...

Last updated: Nov 26, 2008   2:37 PM GMT  |  Blog: Security Wire Weekly
Security at the application level

Blog   One long-awaited trend that's finally begun to take off is attention to security at the application level. It's not surprising as hackers are increasingly focusing on applications and data. But it takes time to develop the capability to build better security into applications. Fortunately we'r...

Last updated: Oct 31, 2008   9:20 AM GMT  |  Blog: David Laceys IT Security Blog   |      de-perimeterisation, Security Solutions, Technology
Containing the application security problem

Blog  The benefit of containers for the easy, efficient and portable deployment of applications has become more and more apparent in recent years, especially where application development and delivery is continuous through a DevOps-style process. The trend has been helped by the availability of open sourc...

Last updated: Nov 26, 2015   4:22 PM GMT  |  Blog: Quocirca Insights
Cloud development kudos lies in 'enhanced' multi-tenancy

Blog  People, users, customers, lawyers and (possibly even) software application developers appear to have been worried about cloud security for some time now. But many initial misgivings were quite quickly dismissed as users started to realise the proposition that the cloud vendors were coming to market...

Last updated: Jul 25, 2012   7:03 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Web application security matters, even without a compliance mandate

Blog  Jeremiah Grossman, the CTO of White Hat Security, has been at the forefront of documenting the dangers of Web application security. As he points out on his blog, however, state and federal regulations are lagging behind in addressing Web application security, even though many enterprises are increa...

Last updated: Mar 11, 2010   9:15 PM GMT  |  Blog: IT Compliance Advisor

Blog  HTTPS (HTTP over SSL or HTTP Secure) is the use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer under regular HTTP application layering. Continued... Quote of the Day "Installing a digital certificate and providing users with the ability to make HTTPS connections to you...

Last updated: Sep 16, 2016   2:42 PM GMT  |  Blog: Word of the Day: Tech Definitions from   |      HTTPS, Security
Spyware code targets BlackBerry users

Blog  Proof-of-concept code released by a security researcher could be tweaked for use on almost any device. Demonstrates need for caution with mobile applications. A security researcher demonstrating some of the weaknesses in mobile devices has chosen to target Blackberrys with new proof-of-concept code...

Last updated: Feb 9, 2010   2:20 PM GMT  |  Blog: Security Bytes
Assessing the mobile application security threat

Blog  Mike Zusman and Zach Lanier of New York-based security consultancy Intrepidus Group on the growing threat posed by poorly coded mobile applications. Program links: Mobile application flaws a repeat of past mistakes Developers of mobile applications are repeating many of the same coding errors that...

Last updated: Nov 2, 2010   1:48 PM GMT  |  Blog: Security Wire Weekly
How to configure Cisco VIRL - VMMaestro to use external telnet and SSH Client?

Blog  Cisco VIRL comes with an internal SSH and Telnet client which is quite good and it opens all the SSH and telnet sessions within VMMaestro GUI, but if some one wants to use Secure CRT on their MAC as external client, one can easily configure the changes in VIRL VMMaestro, Terminal>Cisco Termi...

Last updated: Dec 18, 2015   6:34 PM GMT  |  Blog: Network technologies and trends   |      router, SSH, Telnet
Free iPad app for secure enterprise-level single sign-on, really?

Blog  Programmers working at the coalface of cloud services development just now will no doubt have the words "secure access to corporate data via mobile" ringing in their ears at some point. For some time now the emphasis has been on methods to develop and refine secure remote access and (if you have th...

Last updated: Jul 12, 2012   6:43 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
How MNOs can secure the multiple layers of IoT

Blog  Security online continues to dominate the headlines. Only a few weeks ago ransomware wreaked havoc on over 230,000 computers and spread its tentacles to over 150 countries. Prior to that it was the Mirai botnet that spread fear. The list of malware goes on and on, and businesses are trying their bes...

Last updated: Jun 27, 2017   8:19 PM GMT  |  Blog: IoT Agenda   |      Authentication, Consumer IoT, Enterprise IoT
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...249 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: