Search Results | Application security
PREV 1...5   10   15...16   17   18   19   20   21   22   23   24   25...   30   40   50...249 NEXT
Sort by:  Most Relevant  |  Date
Experts to IT: Focus on data, not devices

Blog  NEW YORK -- Many IT managers are scrambling to control the influx of personal smartphones and tablets in the enterprise. But they might want to focus more on applications and data. That was the message from analysts at this weeks Interop New York conference, where the consumerization of IT was a...

Last updated: Oct 7, 2011   3:14 PM GMT  |  Blog: Taking Back IT
A year of networking dangerously: Security breaches at the brink

Blog  Ask network administrators what their biggest concerns are over the next several months, and most will quickly rattle off such things as bandwidth optimization, network reliability and remote access management. When the day is done, however, and they are sitting in the comfort of their homes, away ...

Last updated: Jun 30, 2009   3:59 PM GMT  |  Blog: Window on WANs
Palo Alto Networks releases PAN-OS 8.1 and new hardware firewalls

Blog  The recent press release from Palo Alto networks comes with a great surprise as they released PAN-OS 8.1 which comes with some great new features and enhancements, also the new hardware they introduced have plenty to offer. With growing threats targeted in form, SSL is always challenging to interce...

Last updated: Feb 21, 2018   5:42 AM GMT  |  Blog: Network technologies and trends   |      Data centers, Decryption, Networks
Application beauty is not skin deep

Blog  This is a guest post for the Computer Weekly Developer Network by Paul Steiner -- general manager for EMEA of enterprise-class secure mobile productivity solutions company Accellion. #BLURREDLINES The lines between enterprise and consumer technology have never been so blurred, as enterprise appl...

Last updated: Jan 29, 2014   4:52 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
SANS Top 20 released, but is it still useful?

Blog  The SANS Institute released its 2007 Top 20 threats list today (They still call it the Top 20, even though there are only 18 items on this year's list), and the main takeaway is pretty much the same as last year: The bad guys are preying on gullible users and flawed applications such as Web browsers...

Last updated: Nov 27, 2007   6:11 PM GMT  |  Blog: Security Bytes
uTest releases new apps for the iPhone and iPad

Blog  Crowdsource test group uTest announced January 18th the release of a new mobile application for their customers and30,000+ tester community.The application allows testers to use their iPhone or iPad to enter bugs, communicate with the uTest community and customers, accept invitations to projects...

Last updated: Jan 21, 2011   7:51 PM GMT  |  Blog: Software Quality Insights
How to deploy a Metro App to the Desktop?

Answer  I am trying to deploy a C# app to my Windows 8 Metro desktop. The deployed files are in the bin folder but when I try to access them I get the following error: This application can only run in the context of an AppContainer. I checked the properties context menu and I searched through both the mani...

Last updated: Sep 4, 2013   3:57 PM GMT   |    Metro, Microsoft Windows 8
Can DevOps bring together speed, self-service & security?

Blog  This is a guest post for the Computer Weekly Developer Network written by David Moss in his role as regional director for western Europe at Avi Networks. Moss writes One dictionary definition of the word conjoined is being brought together for a common purpose. In the all too often dispar...

Last updated: Apr 26, 2019   9:13 AM GMT  |  Blog: CW Developer Network
Buffer overflow tutorial: How to find vulnerabilities, prevent attacks

Blog   Buffer overflow exploits and vulnerabilities can lead to serious harm to corporate Web applications, as well as embarrassing and costly data security breaches and system compromises.

Last updated: Jan 12, 2010   1:57 PM GMT  |  Blog: Security Wire Weekly
The secure enterprise Android dream awakens?

Blog  Open source technology is not necessarily any less secure than proprietary. There -- we've said it, do you feel better? Industry protagonists, commentators, analysts, evangelists and (god forbid) even bloggers cum technical journalists (scum of the Earth of course) have been advocating the wider "...

Last updated: Mar 1, 2013   12:43 AM GMT  |  Blog: Open Source Insider   |      Uncategorized
Machine learning, AI in security: Advancing the cybersecurity landscape

Blog  More companies today are investing in AI-based cybersecurity technology to speed up incident detection and response, to better identify and communicate risk to the business, and to gain a better understanding of cybersecurity situational awareness. That's according to ESG research that found 12% of ...

Last updated: Aug 7, 2018   6:55 PM GMT  |  Blog: TotalCIO
HP earns EAL 4 certification on Linux

Blog  Today HP execs wrote to tell us that their company has been awarded a top international Linux security certification. The certification, called the Evaluation Assurance Level 4 (EAL4+) Common Criteria security certification for Red Hat Enterprise Linux 5, applies to HP servers, workstations and note...

Last updated: Jul 16, 2007   4:52 PM GMT  |  Blog: Enterprise Linux Log
Amazon cloud services: AWS Marketplace offers one-click cloud security

Blog  The new AWS Marketplace, launched by Amazon last week, is an interesting development on the cloud security front. The Amazon cloud services marketplace allows customers to choose from a menu of various software products and SaaS services, and launch the applications in their EC2 environments with on...

Last updated: Apr 25, 2012   2:55 PM GMT  |  Blog: Security Bytes
Spot the security expert

Blog  Guy Coma became an instantly forgotten star of television and the Internet when he was mistakenly interviewed on air by the BBC in place of an IT expert after a mix-up. Fact of the matter is that he just about managed to pull it off (you can watch it here) which begs the question of how you are supp...

Last updated: Oct 15, 2008   2:30 PM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Security management
deep packet inspection (DPI)

Blog  Deep packet inspection (DPI) is an advanced method of examining and managing network traffic. Continued Quote of the Day "DPI enables IT administrators and security officials to set policies and enforce them at all layers, including the application and user layer, to help combat malware and othe...

Last updated: Jul 17, 2019   5:32 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
How does Palo Alto Networks Firewall examines an UDP Packet to identify an application?

Blog  In the below example, a single DNS query packet is trying to query the domain www.yasirirfan.com. This packet contains all the information needed by a Palo Alto Network Firewalls to identify an app, by inspecting the below UDP packet it can determine Is the packet genuine and trying to use ...

Last updated: Feb 13, 2016   8:40 AM GMT  |  Blog: Network technologies and trends   |      application, Application firewalls, DNS
Trusted execution environments: What, how and why?

Blog  The TEE is no longer an emerging technology. If you've ever used apps like Samsung Pay or WeChat Pay, device features like Samsung KNOX/Secure Folder, or many of the leading Android device makers' flagship phones, then you've been protected by one. But it is not a technology that is confined to high...

Last updated: Apr 18, 2018   6:11 PM GMT  |  Blog: IoT Agenda   |      Authentication, identity, Internet of Things
Microsoft Patch Tuesday Update - 9th February 2011

Blog   With this Microsoft Patch Tuesday update, we see a large set of updates in comparison to the recent small list of updates release by Microsoft for the month of January. In total there are 12 Microsoft Security Updates with the following rating; 3 Critical and 9 as rated Important. Though this is a ...

Last updated: Feb 10, 2011   11:31 AM GMT  |  Blog: Cliff Saran’s Enterprise blog   |      Uncategorized
Some Facebook applications lead to Russian attack sites

Blog  Poor coding on some Facebook apps lead to websites pushing malware, rogue antivirus. Security researchers at antivirus vendor AVG Technologies have discovered that faulty coding in some Facebook applications are being targeted by cybercriminals. Roger Thompson, chief research officer of AVG cited s...

Last updated: Oct 15, 2009   1:15 PM GMT  |  Blog: Security Bytes
Microsoft Developers Highway Code

Blog  I'm not impressed by the new version of the Developer Highway Code from Microsoft. There's no denying the fact that it's all good, sound, common sense guidance but I'm wondering for who, and also who Microsoft expect to actually read it. Let's take Module 2 on "Security Objectives." We all know tha...

Last updated: Dec 19, 2007   5:30 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Microsoft
PREV 1...5   10   15...16   17   18   19   20   21   22   23   24   25...   30   40   50...249 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: