Search Results | Application security
PREV 1...10   20...26   27   28   29   30   31   32   33   34   35...   40   50   60   70...252 NEXT
Sort by:  Most Relevant  |  Date and the debate over SaaS security, email confidentiality

Blog  Software as a Service (SaaS) is growing in popularity, and along with it comes the inevitable debate over the security implications. Driving the debate is recent news about a security breach affecting clients of SaaS vendor, including Automatic Data Processing Inc. (ADP) -- one of th...

Last updated: Nov 2, 2007   2:08 PM GMT  |  Blog: Security Bytes
For data security, cloud computing customers must accept a DIY approach

Blog  Earlier this week, Context Information Security revealed the astonishing findings of its investigation into a sampling of four cloud service providers (CSPs) - Amazon EC2, Gigenet, Rackspace Context found unpatched systems, missing antivirus and back doors left open, leaving cloud cust...

Last updated: Apr 26, 2012   12:24 AM GMT  |  Blog: Security Bytes
Facebook Security Threats Continue to Grow

Blog  The two latest malware strains exploit Facebook users via email and instant messaging programs. The first, Asprox.N, is a Trojan delivered via email informing users their Facebook account is being used to distribute spam and that, for security reasons, the login credentials have been changed. Th...

Last updated: Jan 31, 2011   11:50 PM GMT  |  Blog: Security Corner
Microsoft products and technologies, just how many products Microsoft Offer

Blog  How much do you really know about what Microsoft has to offer? Microsoft Windows (Client) Premium editions of Windows Vista: Windows Vista Home Premium, Windows Vista Business, Windows Vista Enterprise and Windows Vista Ultimate Basic editions of Windows Vista: Windows Vista Home Basic,...

Last updated: Dec 13, 2008   8:03 AM GMT  |  Blog: IT Project Management   |      Project management
Tools, techniques to avoid common software security mistakes

Blog  Software developers make common and avoidable mistakes that create vulnerabilities and expose their software to ever-present security threats, according to field observations by Vic DeMarines. Yesterday I spoke with Vic, VP of products at V.i. Laboratories Inc. (V.i. Labs) in Waltham, Mass. V.i. Lab...

Last updated: Jan 23, 2009   9:39 PM GMT  |  Blog: Software Quality Insights
Whos your Cloud Daddy developer daddy?

Blog  Whos your daddy? -- sang the Zombies in their 1967 hit Time Of The Season. Then came Ray Winstone in Scum in 1979, he was certainly the daddy. Fast forward to 2018 and whos the daddy? Secure AWS-native data protection company Cloud Daddy thinks it could have the answer. Available on the A...

Last updated: Jun 29, 2018   10:33 AM GMT  |  Blog: CW Developer Network
Microsoft: the mixed fruit of maturity

Blog   Seven years ago, Microsoft was a byword for buggy software. Its codebase was a notorious happy hunting ground for delinquent virus writers. The "Summer of Worms" in 2003, when the Blaster, Welchia and Sobig malware wreaked havoc, turning computer viruses into kitchen table conversation topics, is n...

Last updated: Mar 5, 2009   6:29 PM GMT  |  Blog: Computer Weekly Editor's Blog   |      Internet Explorer, Microsoft
Latest on application security

Blog  I make no secret of the fact that my first interest in security is around the online product side of things. So easy to get completely wrong and the same old lessons are continually being relearnt. I used to take a smug satisfaction in showing developers how easy it could be to find the flaws in the...

Last updated: Oct 22, 2007   6:00 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      OWASP, Web security
Sharepoint 2010 and opening PDF Files

Blog  I ran into a problem with our Sharepoint 2010 site not allowing pdf files directly it would only prompt you to save it. I found the fix was pretty simple and that was to do the following. Just be aware you are opening up the security on the sites with the files.   1.Verified Adobe Reader opti...

Last updated: Jul 11, 2012   4:55 PM GMT  |  Blog: SBS 2003 and beyond
Top Security Concerns For 2018-2019

Blog  There were more than 600 exhibitors in April at this year's RSA Conference in San Francisco. The attendance was almost touching 50,000. There are some very prominent key cybersecurity concerns that will keep IT managers on toes for next couple of years, at least. Those in the Asia Pacific and Japan ...

Last updated: Jun 16, 2018   5:18 AM GMT  |  Blog: Quality Assurance and Project Management   |      Cyber security, Encryption, enterprise cyber security
Oracle claims Solaris 11 is "first" cloud operating system

Blog  After this morning's news of the Red Hat Fedora 16 operating system and its relevance and applicability to cloud computing and virtualisation, further news in this zone appears to have surfaced.Notwithstanding Fedora's perhaps more modest mention of its cloud relevance, Oracle has this afternoon fol...

Last updated: Nov 9, 2011   3:41 PM GMT  |  Blog: Open Source Insider   |      Uncategorized
Why Public Key Infrastructure (PKI) has failed

Blog   There are several reasons PKI has failed, says Peter Tippett, head of the industry solutions and security practice at Verizon Business. The main reason organisation do not use PKI, he told attendees of RSA Conference 2011, is that it costs too much. Speaking on a debate on the importance of identi...

Last updated: Feb 23, 2011   2:00 PM GMT  |  Blog: Read all about IT!   |      Security
Auditing Systems and Infrastructure Life Cycle Management - Part IV

Blog  Application-based implementation audits assess any or all parts of the deployment process of a project. The IT auditor should assess relevant SDLC stages, as they are occurring, to highlight risks or issues and provide necessary risk mitigation recommendations to the appropriate management. ...

Last updated: Dec 27, 2011   9:38 PM GMT  |  Blog: IT Governance, Risk, and Compliance
Sponsor Post: July's Upcoming Microsoft Live Chats

Blog  Join IT Knowledge Exchange and Microsoft for these Upcoming Live Expert Chats Todays workforce faces a constantly evolving landscape of threats to information and infrastructureand even to regulatory compliance. Endpoints are exposed to attacks both inside and outside the corporate firewall, r...

Last updated: Jul 6, 2010   3:44 PM GMT  |  Blog: ITKE Community Blog
The Sociology of Going Mobile

Blog  Mobility is about much more than technology. Alan Murray of mobile application management vendor Apperian joins us to discuss all the other issues that factor into a successful mobility initiative. Our hosts also chat about mobile security and review Microsoft's Surface 3.

Last updated: Jun 12, 2015   12:00 AM GMT  |  Blog: Modern Mobility Podcast   |      Microsoft, Microsoft Surface, mobile application management
Event ID 1202

Answer  i am getting this error event id 1202( security policies were propagated with warning. 0x4b8 : An extended error has occurred)in windows 2003 enterprise server which is dc in our domain environment , this error comes after every 5 minutes in application events. i have tried all microsoft articles re...

Last updated: Feb 6, 2008   3:47 AM GMT   |    Microsoft Windows Server 2003
Accessing SQL Server with a Visual Basic application

Answer  I have an application in Visual Basic 6 with SQL Server as the back-end. It is supposed to be run on a server, but it will not access the server when installed and run on a clients machine. I think it might be a code issue; I have used the following coding at form load: cnh = "Provider=SQLOLED...

Last updated: Sep 11, 2008   5:40 PM GMT   |    SQL Server, Visual Basic 6
Battery Charger Beats Security

Blog  News has emerged from US-CERT that a USB battery charger (specifically the Energizer DUO) carries with it a trojan, buried in the Windows application that can be used to monitor the charger status. Apparently the backdoor enables remote system access.This just goes to show the importance of checking...

Last updated: Mar 15, 2010   1:49 PM GMT  |  Blog: Bloor Security   |      Uncategorized
What are the best Android mobile security apps?

Blog  Traditional antivirus vendors are doing a good job detecting and blocking known mobile malware, according to Av-Test, a Germany-based independent service provider that tests antivirus and antimalware software. The firm tested the detection capabilities of a variety of available Android mobile secur...

Last updated: Mar 6, 2012   9:01 PM GMT  |  Blog: Security Bytes
Sound the alarm: How to get serious about industrial IoT security

Blog  Steady adoption of the internet of things continues to dramatically influence industrial architectures. Organizations can now gather and draw insight from a greater volume and variety of data across more diverse sets of applications. And as the movement of information between disparate hardware and ...

Last updated: Dec 28, 2016   8:36 PM GMT  |  Blog: IoT Agenda   |      IIoT, Internet of Things, iot security
PREV 1...10   20...26   27   28   29   30   31   32   33   34   35...   40   50   60   70...252 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: