Search Results | Application security
PREV 1...5   10   15...16   17   18   19   20   21   22   23   24   25...   30   40   50...252 NEXT
Sort by:  Most Relevant  |  Date
Cisco Launches SA 500 Series Security Appliances, specifically designed and priced to meet small business needs

Blog   If you are having an Organization with 100 employees or less and you are looking for an appropriate Security device to protect your Organization from the frequently growing internet threats, also offering secured wireless, offering Virtual Private Network (VPN) services to remote branch off...

Last updated: Sep 26, 2009   7:20 AM GMT  |  Blog: Network technologies and trends
APT Protection via Data-Centric Security

Blog   I'll be contributing to a Webinar on APT Protection via Data-Centric Security next Thursday. Given the progressive erosion of corporate perimeter security it's about time we switched our attention to hardening our applications and data.The Jericho Forum have been preaching this for more than a...

Last updated: Oct 19, 2013   5:09 PM GMT  |  Blog: David Laceys IT Security Blog   |      Information security
5 Questions to Ask Your Hybrid Cloud Service Provider

Blog  There was an article on Search Cloud Computing the other day with a headline stating that hybrid cloud deployment is the future of the enterprise. The article quotes Forrester Research analyst Dave Bartoletti as stating that more than 50% of enterprises will be prioritizing private clouds in 2013 an...

Last updated: Nov 18, 2013   11:44 PM GMT  |  Blog: Hybrid Cloud Trender   |      Hybrid Cloud, Hybrid Cloud TCO
Experts to IT: Focus on data, not devices

Blog  NEW YORK -- Many IT managers are scrambling to control the influx of personal smartphones and tablets in the enterprise. But they might want to focus more on applications and data. That was the message from analysts at this weeks Interop New York conference, where the consumerization of IT was a...

Last updated: Oct 7, 2011   3:14 PM GMT  |  Blog: Taking Back IT
A year of networking dangerously: Security breaches at the brink

Blog  Ask network administrators what their biggest concerns are over the next several months, and most will quickly rattle off such things as bandwidth optimization, network reliability and remote access management. When the day is done, however, and they are sitting in the comfort of their homes, away ...

Last updated: Jun 30, 2009   3:59 PM GMT  |  Blog: Window on WANs
Palo Alto Networks releases PAN-OS 8.1 and new hardware firewalls

Blog  The recent press release from Palo Alto networks comes with a great surprise as they released PAN-OS 8.1 which comes with some great new features and enhancements, also the new hardware they introduced have plenty to offer. With growing threats targeted in form, SSL is always challenging to interce...

Last updated: Feb 21, 2018   5:42 AM GMT  |  Blog: Network technologies and trends   |      Data centers, Decryption, Networks
Application beauty is not skin deep

Blog  This is a guest post for the Computer Weekly Developer Network by Paul Steiner -- general manager for EMEA of enterprise-class secure mobile productivity solutions company Accellion. #BLURREDLINES The lines between enterprise and consumer technology have never been so blurred, as enterprise appl...

Last updated: Jan 29, 2014   4:52 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
SANS Top 20 released, but is it still useful?

Blog  The SANS Institute released its 2007 Top 20 threats list today (They still call it the Top 20, even though there are only 18 items on this year's list), and the main takeaway is pretty much the same as last year: The bad guys are preying on gullible users and flawed applications such as Web browsers...

Last updated: Nov 27, 2007   6:11 PM GMT  |  Blog: Security Bytes
uTest releases new apps for the iPhone and iPad

Blog  Crowdsource test group uTest announced January 18th the release of a new mobile application for their customers and30,000+ tester community.The application allows testers to use their iPhone or iPad to enter bugs, communicate with the uTest community and customers, accept invitations to projects...

Last updated: Jan 21, 2011   7:51 PM GMT  |  Blog: Software Quality Insights
Can DevOps bring together speed, self-service & security?

Blog  This is a guest post for the Computer Weekly Developer Network written by David Moss in his role as regional director for western Europe at Avi Networks. Moss writes One dictionary definition of the word conjoined is being brought together for a common purpose. In the all too often dispar...

Last updated: Apr 26, 2019   9:13 AM GMT  |  Blog: CW Developer Network
How to deploy a Metro App to the Desktop?

Answer  I am trying to deploy a C# app to my Windows 8 Metro desktop. The deployed files are in the bin folder but when I try to access them I get the following error: This application can only run in the context of an AppContainer. I checked the properties context menu and I searched through both the mani...

Last updated: Sep 4, 2013   3:57 PM GMT   |    Metro, Microsoft Windows 8
The secure enterprise Android dream awakens?

Blog  Open source technology is not necessarily any less secure than proprietary. There -- we've said it, do you feel better? Industry protagonists, commentators, analysts, evangelists and (god forbid) even bloggers cum technical journalists (scum of the Earth of course) have been advocating the wider "...

Last updated: Mar 1, 2013   12:43 AM GMT  |  Blog: Open Source Insider   |      Uncategorized
Machine learning, AI in security: Advancing the cybersecurity landscape

Blog  More companies today are investing in AI-based cybersecurity technology to speed up incident detection and response, to better identify and communicate risk to the business, and to gain a better understanding of cybersecurity situational awareness. That's according to ESG research that found 12% of ...

Last updated: Aug 7, 2018   6:55 PM GMT  |  Blog: TotalCIO
Buffer overflow tutorial: How to find vulnerabilities, prevent attacks

Blog   Buffer overflow exploits and vulnerabilities can lead to serious harm to corporate Web applications, as well as embarrassing and costly data security breaches and system compromises.

Last updated: Jan 12, 2010   1:57 PM GMT  |  Blog: Security Wire Weekly
HP earns EAL 4 certification on Linux

Blog  Today HP execs wrote to tell us that their company has been awarded a top international Linux security certification. The certification, called the Evaluation Assurance Level 4 (EAL4+) Common Criteria security certification for Red Hat Enterprise Linux 5, applies to HP servers, workstations and note...

Last updated: Jul 16, 2007   4:52 PM GMT  |  Blog: Enterprise Linux Log
Amazon cloud services: AWS Marketplace offers one-click cloud security

Blog  The new AWS Marketplace, launched by Amazon last week, is an interesting development on the cloud security front. The Amazon cloud services marketplace allows customers to choose from a menu of various software products and SaaS services, and launch the applications in their EC2 environments with on...

Last updated: Apr 25, 2012   2:55 PM GMT  |  Blog: Security Bytes
Spot the security expert

Blog  Guy Coma became an instantly forgotten star of television and the Internet when he was mistakenly interviewed on air by the BBC in place of an IT expert after a mix-up. Fact of the matter is that he just about managed to pull it off (you can watch it here) which begs the question of how you are supp...

Last updated: Oct 15, 2008   2:30 PM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Security management
deep packet inspection (DPI)

Blog  Deep packet inspection (DPI) is an advanced method of examining and managing network traffic. Continued Quote of the Day "DPI enables IT administrators and security officials to set policies and enforce them at all layers, including the application and user layer, to help combat malware and othe...

Last updated: Jul 17, 2019   5:32 PM GMT  |  Blog: Word of the Day: Tech Definitions from
Trusted execution environments: What, how and why?

Blog  The TEE is no longer an emerging technology. If you've ever used apps like Samsung Pay or WeChat Pay, device features like Samsung KNOX/Secure Folder, or many of the leading Android device makers' flagship phones, then you've been protected by one. But it is not a technology that is confined to high...

Last updated: Apr 18, 2018   6:11 PM GMT  |  Blog: IoT Agenda   |      Authentication, identity, Internet of Things
How does Palo Alto Networks Firewall examines an UDP Packet to identify an application?

Blog  In the below example, a single DNS query packet is trying to query the domain This packet contains all the information needed by a Palo Alto Network Firewalls to identify an app, by inspecting the below UDP packet it can determine Is the packet genuine and trying to use ...

Last updated: Feb 13, 2016   8:40 AM GMT  |  Blog: Network technologies and trends   |      application, Application firewalls, DNS
PREV 1...5   10   15...16   17   18   19   20   21   22   23   24   25...   30   40   50...252 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: