Search Results | Application security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...249 NEXT
Sort by:  Most Relevant  |  Date
F5 on working inside the 'dynamic cloud fabric', safely

Blog  F5 Networks used its Agility 2015 conference in Edinburgh this week to launch a new 'cloud-delivered' managed service to defend against web application attacks. The service also aims to "ensure compliance" across dynamic cloud and datacentre environments. NOTE: F5 it's almost superfluous that F5 s...

Last updated: May 20, 2015   8:41 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Securing the cloud: Is IDS passe?

Answer  It used to be a good design to not only run applications in different tiers, but also physically separate them on different network switches. Network devices have since improved (security wise) and some folks seem to be alright with virtual switches. And then came the cloud infrastructure where secu...

Last updated: Feb 3, 2010   1:01 PM GMT   |    Cloud Computing, Cloud Security, Knowledge Point Challenge
Threat Monitor: An enterprise strategy for Web application security threats

Blog  People Security founder Hugh Thompson reviews the tools and tactics, from routine assessments to Web application firewalls, that are essential to an application security strategy,

Last updated: Oct 1, 2009   7:08 PM GMT  |  Blog: Security Wire Weekly
Googles project Asylo creates enclaved cloud apps

Blog  Theres application components and theres containerisation and theres all forms of compartmentalisation designed to separate out discrete functions of application design in order to align with the abstracted world of cloud computing and web architecture where we can manage resources in...

Last updated: May 7, 2018   2:23 PM GMT  |  Blog: CW Developer Network   |      Google
Without "standardization," is cloud-based application security up in the air?

Blog  Fortify software, a security test and assessment service provider, now offers security testing and assessment for cloud-destined applications. Fortify 360 and Fortify on Demand services are available for cloud applications as of May 18. There are two promises the cloud makes to application devel...

Last updated: May 18, 2010   3:40 PM GMT  |  Blog: Software Quality Insights
Vulnerability management tool ThreadFix facilitates development and security efforts

Blog  Application developers and security analysts can communicate and collaborate more easily using Denim Group's new open source vulnerability management tool ThreadFix. In a recent announcement, Denim Group explained that "ThreadFix imports the data from automated dynamic and static scanners as well a...

Last updated: Sep 20, 2012   2:45 PM GMT  |  Blog: Software Quality Insights
Will cloud applications be certified by IT audit? What kind of applications can we safely offload to the cloud?

Answer  My organization is looking to offload some of our calculation intensive applications to the cloud. We are concerned about security. Between Amazon, Google, and Microsoft (or another vendor), which seems to have the most complete security / data security reputation. Does anyone have any experience ge...

Last updated: Sep 22, 2009   7:29 PM GMT   |    Cloud Applications, Cloud Computing, Cloud Security
Google releases Ratproxy security assessment tool

Blog  Google is continuing its incursion into the security world with the release of its passive Web application security assessment tool, Ratproxy. The tool differs from most of the other Web application security tools in that it does not actively crawl applications looking for common security problems. ...

Last updated: Jul 2, 2008   2:22 PM GMT  |  Blog: Security Bytes
Moving edge computing applications from pilot to production

Blog  In the year 2019, businesses are realizing the advantages of edge computing and moving their applications closer to the source of data. Organizations are moving edge applications for video surveillance, industrial IoT, smart mobility and smart cities from pilot to production. Each application perfor...

Last updated: Jul 23, 2019   4:16 PM GMT  |  Blog: IoT Agenda   |      Edge computing, Internet of Things, iot
Database Security - Patching is not enough

Blog  Next Tuesday, 16th January 2007, Oracle will issue 52 critical patches. Its clearly a great leap forward for database vulnerability management. But it also illustrates the size of our security exposure at the application level. Any company that relies on database security measures to safeguard cr...

Last updated: Jan 12, 2007   8:39 PM GMT  |  Blog: David Laceys IT Security Blog   |      Technology, threats, vulnerability management
firefox browser

Answer  Could not initialize the application's security component. The most likely cause is problems with files in your application's profile directory. Please check that this directory has no read/write restrictions and your hard disk is not full or close to full. It is recommended that you exit the applic...

Last updated: Feb 8, 2014   12:56 AM GMT   |    opening EXE
Building security requirements into software: Mobile apps, Web services and the cloud

Blog  Organizations are more concerned about application security thanever and have a growing awareness of security concerns. SearchSoftwareQuality.coms newest expert, Dan Cornell, principal of software consulting company Denim Group, discusses mobile security, what organizations can do to build secu...

Last updated: Jul 24, 2012   2:06 PM GMT  |  Blog: Software Quality Insights
The emergence of a new data-centric management vendor

Blog  It doesnt seem that long ago where there were three main focuses on data security: - Hardware/application security - Database security - Document management security Each had its own focus; each had its own problems. Layering the three approaches together often left gaping holes through whi...

Last updated: Aug 11, 2017   9:51 AM GMT  |  Blog: Quocirca Insights
Hackers rooting and jailbreaking mobile apps for evil malware creation

Blog  San Antonio based web application security specialist Denim Group has been airing its opinions on the security challenges facing developers looking at mobile app creation. The company asserts that mobile applications can be (especially) challenging to develop securely because they have "a very diff...

Last updated: Nov 1, 2011   2:48 PM GMT  |  Blog: CW Developer Network   |      Uncategorized
WhiteHat acquires static code analysis technology

Blog  Move to acquire Infrared Security will add static code analysis to WhiteHats dynamic vulnerability testing platform. WhiteHat Security has acquired static code analysis technology from Infrared Security in a move to add the functionality to its Sentinal code analysis application, which until now ...

Last updated: Jun 23, 2011   2:08 PM GMT  |  Blog: Security Bytes
Online devices, applications and threats grow - predictions for 2013

Blog  The Cisco 2010 Midyear Security Report shows some staggering statistics about the number of online devices, mobile applications and security threats projected to be around in 2013. In 2007 there were 500 million connected devices or 1/10th of a connected device per person worldwide. In 2010, there...

Last updated: Aug 26, 2010   6:08 PM GMT  |  Blog: IT Trenches
Security Testing for Web Applications Is A No Compromise Affair

Blog  Increasing presence on the web is also exposing our applications and data to higher risk. These risks include cyber attacks that are now increasingly creating panic for enterprises. That is why security testing for all kind of web applications are very important. In fact, important to an extent that...

Last updated: Sep 30, 2017   2:56 AM GMT  |  Blog: Quality Assurance and Project Management   |      Application security, Cloud Security, code security
A CIO's advice for cloud security in the cloud age

Blog  Brian Lillie, CIO at data center builder Equinix, a company where security is "embedded in everything we do," said that doling out general advice for bolstering IT security in the cloud computing era is difficult because all organizations are different. But there are guidelines they can follow to ta...

Last updated: Feb 1, 2016   2:54 AM GMT  |  Blog: TotalCIO   |      Cloud Computing, Cloud Security, cyberdefense
Coverity/Armorize partner up to get security defects eliminated earlier in SDLC

Blog  Coverity and Armorize are two fairly well-known names in the software industry. Coverity is known for its static source code analysis and Armorize is recognized for its security provisioning. As of today, the two have joined forces to provide the best of both worlds under one umbrella allowing st...

Last updated: Jul 13, 2010   6:00 AM GMT  |  Blog: Software Quality Insights
Veracode offers free Cross-site scripting (XSS) check tool

Blog  Application security company Veracode is demonstrating to developers how easy it is to test and identify vulnerabilities in their applications by granting free access to one of its services. Veracode's offerings include automated binary analysis in the cloud and as of today, developers can register ...

Last updated: Feb 1, 2011   12:26 AM GMT  |  Blog: Enterprise IT Watch Blog
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...249 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: