Search Results | Application security
PREV 1...10   20...26   27   28   29   30   31   32   33   34   35...   40   50   60   70...249 NEXT
Sort by:  Most Relevant  |  Date
Latest on application security

Blog  I make no secret of the fact that my first interest in security is around the online product side of things. So easy to get completely wrong and the same old lessons are continually being relearnt. I used to take a smug satisfaction in showing developers how easy it could be to find the flaws in the...

Last updated: Oct 22, 2007   6:00 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      OWASP, Web security
Tools, techniques to avoid common software security mistakes

Blog  Software developers make common and avoidable mistakes that create vulnerabilities and expose their software to ever-present security threats, according to field observations by Vic DeMarines. Yesterday I spoke with Vic, VP of products at V.i. Laboratories Inc. (V.i. Labs) in Waltham, Mass. V.i. Lab...

Last updated: Jan 23, 2009   9:39 PM GMT  |  Blog: Software Quality Insights
Whos your Cloud Daddy developer daddy?

Blog  Whos your daddy? -- sang the Zombies in their 1967 hit Time Of The Season. Then came Ray Winstone in Scum in 1979, he was certainly the daddy. Fast forward to 2018 and whos the daddy? Secure AWS-native data protection company Cloud Daddy thinks it could have the answer. Available on the A...

Last updated: Jun 29, 2018   10:33 AM GMT  |  Blog: CW Developer Network
Microsoft: the mixed fruit of maturity

Blog   Seven years ago, Microsoft was a byword for buggy software. Its codebase was a notorious happy hunting ground for delinquent virus writers. The "Summer of Worms" in 2003, when the Blaster, Welchia and Sobig malware wreaked havoc, turning computer viruses into kitchen table conversation topics, is n...

Last updated: Mar 5, 2009   6:29 PM GMT  |  Blog: Computer Weekly Editor's Blog   |      Internet Explorer, Microsoft
Top Security Concerns For 2018-2019

Blog  There were more than 600 exhibitors in April at this year's RSA Conference in San Francisco. The attendance was almost touching 50,000. There are some very prominent key cybersecurity concerns that will keep IT managers on toes for next couple of years, at least. Those in the Asia Pacific and Japan ...

Last updated: Jun 16, 2018   5:18 AM GMT  |  Blog: Quality Assurance and Project Management   |      Cyber security, Encryption, enterprise cyber security
Connecting to Oracle database from web page using Visual Studio/Visual Basic

Answer  I have been able to use OleDB to connect to Oracle databases with no problem in Windows forms applications on my development machine that is both my IIS server and Oracle server. But when I try to do it in a Web application I get the error message 'Oracle client and networking components not found'...

Last updated: Mar 19, 2005   12:54 AM GMT   |    Development, DHCP, DNS
Oracle claims Solaris 11 is "first" cloud operating system

Blog  After this morning's news of the Red Hat Fedora 16 operating system and its relevance and applicability to cloud computing and virtualisation, further news in this zone appears to have surfaced.Notwithstanding Fedora's perhaps more modest mention of its cloud relevance, Oracle has this afternoon fol...

Last updated: Nov 9, 2011   3:41 PM GMT  |  Blog: Open Source Insider   |      Uncategorized
Why Public Key Infrastructure (PKI) has failed

Blog   There are several reasons PKI has failed, says Peter Tippett, head of the industry solutions and security practice at Verizon Business. The main reason organisation do not use PKI, he told attendees of RSA Conference 2011, is that it costs too much. Speaking on a debate on the importance of identi...

Last updated: Feb 23, 2011   2:00 PM GMT  |  Blog: Read all about IT!   |      Security
Sponsor Post: July's Upcoming Microsoft Live Chats

Blog  Join IT Knowledge Exchange and Microsoft for these Upcoming Live Expert Chats Todays workforce faces a constantly evolving landscape of threats to information and infrastructureand even to regulatory compliance. Endpoints are exposed to attacks both inside and outside the corporate firewall, r...

Last updated: Jul 6, 2010   3:44 PM GMT  |  Blog: ITKE Community Blog
Sharepoint 2010 and opening PDF Files

Blog  I ran into a problem with our Sharepoint 2010 site not allowing pdf files directly it would only prompt you to save it. I found the fix was pretty simple and that was to do the following. Just be aware you are opening up the security on the sites with the files.   1.Verified Adobe Reader opti...

Last updated: Jul 11, 2012   4:55 PM GMT  |  Blog: SBS 2003 and beyond
Sound the alarm: How to get serious about industrial IoT security

Blog  Steady adoption of the internet of things continues to dramatically influence industrial architectures. Organizations can now gather and draw insight from a greater volume and variety of data across more diverse sets of applications. And as the movement of information between disparate hardware and ...

Last updated: Dec 28, 2016   8:36 PM GMT  |  Blog: IoT Agenda   |      IIoT, Internet of Things, iot security
What are the best Android mobile security apps?

Blog  Traditional antivirus vendors are doing a good job detecting and blocking known mobile malware, according to Av-Test, a Germany-based independent service provider that tests antivirus and antimalware software. The firm tested the detection capabilities of a variety of available Android mobile secur...

Last updated: Mar 6, 2012   9:01 PM GMT  |  Blog: Security Bytes
Auditing Systems and Infrastructure Life Cycle Management - Part IV

Blog  Application-based implementation audits assess any or all parts of the deployment process of a project. The IT auditor should assess relevant SDLC stages, as they are occurring, to highlight risks or issues and provide necessary risk mitigation recommendations to the appropriate management. ...

Last updated: Dec 27, 2011   9:38 PM GMT  |  Blog: IT Governance, Risk, and Compliance
Microsoft Patch Tuesday Report - March 13

Blog  Application Compatibility Update with Quest ChangeBASE Executive Summary With this March Microsoft Patch Tuesday update, we see a set of 6 updates; 1 with the rating of Critical, 4 with the rating of Important and 1 with that of Moderate. This is a relatively small update from Microsoft, and the ...

Last updated: Mar 14, 2012   10:46 AM GMT  |  Blog: Cliff Saran’s Enterprise blog   |      critical, DirectWrite, Domain Name System
SDN catalyst for agility and innovation

Blog  Almost three out of five CIOs we speak with today tell us that technology providers often seem to be pushing software defined networks (SDN) simply to sell hardware, writes Verizon's Peter Konings, and they just dont need more hardware. Lets be clear: SDN isnt a box. It is about enabling b...

Last updated: Jan 24, 2017   8:48 AM GMT  |  Blog: The Full Spectrum   |      SDN
The ugly side of container technology

Blog  If you're like me, you've probably heard a lot of hype surrounding application containers being used in the data centers of today's organizations. What I've found is that there are some important issues and pain points app managers need to be aware of if they are serious about leveraging this techno...

Last updated: Oct 9, 2015   5:16 PM GMT  |  Blog: Microservices Matters   |      Application containerization, Container
Looking Ahead - Less Focus on Nodes

Blog  Back in 2013, I was introduced to a young kid that was the CTO of a startup called CoreOS. His name was Brandon Phillips and he told us that he was building a new type of Linux that had a very small footprint, was focused on containers, and was automatically updated for security. The founders at Cor...

Last updated: Jun 11, 2018   1:40 AM GMT  |  Blog: From Silos to Services: Cloud Computing for the Enterprise   |      CoreOS, Immutable infrastructure, Lambda
Are You a Security "No" Man or a Security "Yes" Man?

Blog  We security wonks always seem to be put into a position of having to say "no." That makes us unpopular with the I'm-not-hurting-anything crowd who insist on checking their webmail, IMing their friends, and running assorted and sundry downloaded and web-based applications (but only on their time, of ...

Last updated: Apr 4, 2008   8:13 PM GMT  |  Blog: Security Corner   |      Networking
Adopt Authority of Files

Answer  I have been asked to secure a completely open system to the users for SOX and just good security practice. I have created a program to call the menu command with a profile with *ALLOBJ authority and specified *OWNER to adopt authority so we can take *ALLOBJ away from users so they only have the acce...

Last updated: Mar 26, 2008   6:42 PM GMT   |    *ALLOBJ, AS/400 security, AS/400 SOX
Oracle supports, licenses for Amazon EC2 cloud environments

Blog   Oracle today announced that customers can license Oracle Database 11g, Oracle Fusion Middleware and Oracle Enterprise Manager to run in a cloud computing environment. The first products will be available for Amazon Web Services Elastic Compute Cloud (Amazon EC2) environment. Customers can als...

Last updated: Sep 23, 2008   1:37 PM GMT  |  Blog: Server Farming   |      Active Directory
PREV 1...10   20...26   27   28   29   30   31   32   33   34   35...   40   50   60   70...249 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: