Search Results | Application security
PREV 1...10   20   30...32   33   34   35   36   37   38   39   40   41...   50   60   70...250 NEXT
Sort by:  Most Relevant  |  Date
Advanced threats require advanced weapons

Blog  The threats we face today are no longer smash-and-grab raids, looking for instant gain. Rather, perpetrators are looking to get a deep foothold into the network. They use subterfuge to trick their way into the organisation that is being specifically targeted and, rather than exiting rapidly, they th...

Last updated: Nov 29, 2012   3:12 PM GMT  |  Blog: Bloor Security   |      endpoint protection, Security, Whitelisting
Oracle Fusion: Ten ways E-Business Suite customers can prepare

Blog  Nadia Bendjedou, director of product strategy at Oracle, gave a presentation at last weeks Collaborate 07 conference that listed 10 things you can do to get ready for Fusion applications as an E-Business Suite customer. We have announced lifetime support. Thats not just marketing, Be...

Last updated: Apr 24, 2007   3:50 PM GMT  |  Blog: Eye on Oracle
Web security - WAFs, Secure Code and Third Party Components

Blog  Some further interesting discussion on the subject of web application firewalls here. Regular readers of this blog (hello mum) will recall that this is a subject I've raised a couple of times in the past (for instance see entries of 08/07/08 and 18/06/08). In his blog, Rich Mogull saysIf you don't h...

Last updated: Oct 24, 2008   10:15 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Security management, Web product security
behavior-based security

Blog  Behavior-based security is a proactive approach to managing security incidents that involves monitoring end user devices, networks and servers in order to flag or block suspicious activity. Continued Quote of the Day "The behavior-based security systems find things that were previously hidden --...

Last updated: May 5, 2017   9:00 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com   |      Breach detection, Phishing, Security
Is the Era of the FullStack Operator Beginning to Emerge?

Blog  If youre an IT Operator, you most likely fit into one of three categories: Silod Technologist (Networking, Storage, Security) Trying to Make Sense of Software-Defined Data Center technologies (e.g. SDS, SDN, HCI) Trying to Make Sense of DevOps If youre in one of the latter two grou...

Last updated: Mar 31, 2017   8:12 PM GMT  |  Blog: From Silos to Services: Cloud Computing for the Enterprise   |      CaaS, containers, DevOps
Remote connectivity for edge computing in IoT

Blog  By 2025, 41.6 billion IoT devices are expected to generate 79.4 zettabytes of data and the collective sum of the world's data will be 175 ZB, according to IDC. Essentially, close to 50% of world data will be generated by IoT. By 2025, 70% of data generated by IoT applications will be processed outsi...

Last updated: Oct 3, 2019   7:03 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, IoT data
Server error in '/' Application

Answer  hi; when I added webpart to web config of sharepoint administrator central and opened the site of sharepoint central administrator the error display : Runtime Error Description: An application error occurred on the server. The current custom error settings for this application prevent the details...

Last updated: Apr 12, 2009   9:53 AM GMT   |    SharePoint administration, SharePoint Central Administration, SharePoint Services
IBM at InfoSec: security megatrends for application development

Blog  IBM the PC company that became IBM the laptop company, that then became IBM the IT services company and then transmogrified into IBM the cloud-focused socially collaborative tools company is (unsurprisingly perhaps) one more version of itself too... Welcome to IBM the security company! Well, in fa...

Last updated: Apr 25, 2012   3:47 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Beefing up security with self-aware apps; building a better IT service model

Blog  Application security is becoming self-aware. A new tool called runtime application self-protection (RASP) could help CIOs boost their IT security, but some experts question whether it's enterprise-ready. What can you do to compete against service providers and take back control of your organization...

Last updated: Feb 27, 2015   7:18 PM GMT  |  Blog: CIO Symmetry   |      application, DevOps, IT services
Healthcare IT & the machine that goes ping! But only once...

Blog  There have always been 'issues' when it comes to technology in the healthcare market. Security of patients' records and the move to make these electronic has been a matter of constant debate. Implementations of technologies such as the Qt application and GUI framework in healthcare IT so...

Last updated: Mar 2, 2012   6:55 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Importance of documenting requirements

Blog  The first question I ask of a web product risk assessment is whether security requirements have been documented. I think it's an important question - there is a definate correlation between the diligence put into security documentation and the resulting risk status of a product - but what always sur...

Last updated: Jan 2, 2007   9:00 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      risk, Risk assessment
Is data security nothing more than wishful thinking?

Blog  It's not often that I read the showbiz bible Variety or the Hollywood Reporter when doing background research for a piece on cloud computing. Yet here we are -- again -- pondering the pervasive perniciousness of breaking intoentertainment-industry data assets. This time around it's HBO. A late Ju...

Last updated: Aug 2, 2017   5:37 PM GMT  |  Blog: Head in the Clouds: SaaS, PaaS, and Cloud Strategy   |      Application security, cybersecurity
WAN security concerns from the 2010 Verizon data breach investigations report

Blog   Today marks the release of thethird annual Verizon data breach investigations report for 2010. Verizon Businessbelieves more should be done in the telecom industry to increase information securityawareness. This is one of the reasons why they began conducting data breach surveys back in 2008....

Last updated: Jul 28, 2010   9:23 PM GMT  |  Blog: Window on WANs
Amazon not to blame for S3 cloud storage lapses

Blog  The Amazon Simple Storage Service (S3) has been giving big businesses and their customers -- big trouble. It was reported earlier this summer that high-profile companies left data in their S3 buckets exposed because the access control lists (ACLs) were configured to allow access from any user on...

Last updated: Nov 15, 2017   2:27 PM GMT  |  Blog: Storage Soup   |      Cloud Security, Cloud storage
Mobile network operators: Overcome IoT challenges using the power of SIM

Blog  The expansion of the Internet of Things (IoT) is a huge growth opportunity for vertical industries and mobile network operators (MNOs), but there are challenges and risks. The recent hacking of a Jeep while it was driving on a public road illustrates the risks to all IoT devices and segments. On the...

Last updated: Apr 8, 2016   2:36 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, SIM
Don't make mobility projects harder than they need to be

Blog  BOSTON -- When it comes to enterprise mobility, IT's job isn't to enable remote access to as many business functions as possible, it's to help the organization set reasonable goals. Here at the VMware User Group User Conference, one of the sessions homed in on why its so important to manage the ...

Last updated: Jun 19, 2015   9:01 PM GMT  |  Blog: Modern Mobility   |      Enterprise mobility, VMware, VMware Horizon 6
IBM pushes cloud plans, partnerships

Blog  If anyone can solve the problems associated with selling cloud computing to enterprises, it should be IBM. Today the company announced a step in that direction with a slew of new services and partnerships to build cloud services for businesses. The key challenges to overcome are: 1) Identity mana...

Last updated: Feb 12, 2009   5:00 PM GMT  |  Blog: The Troposphere
Exploiting SAP DMS as Enterprise Document Management System

Blog  Storing all the key business documents in one place is the key purpose of having an Enterprise DMS (Document Management System). Single Source provides benefits of easy retrieval, increased visibility, one set of rules for managing documents, better control of documents. While Storing documents, sto...

Last updated: Jan 3, 2012   7:37 AM GMT  |  Blog: Enterprise IT Consultant Views on Technologies and Trends
SELinux now enabled in AppArmor's openSUSE

Blog   On Friday, Aug. 22, openSUSE announced that its newest version, 11.1, will support Security Enhanced Linux, or SELinux. Novells security tools, AppArmor and SELinux, have traditionally been considered intense rivals. In this interview, openSUSEs Andreas Jaeger, Roman Drahtmller and Matth...

Last updated: Sep 2, 2008   2:19 PM GMT  |  Blog: Enterprise Linux Log
links for 2008-03-13

Blog   Nimsoft Blogs I can't wait.... quick view of how Nimsoft, a Service Level Management player, sees the IT Infrastructure Management landscape. I would add InfoVista and maybe even NetQoS to the challenger list as I believe they are beyond the "point solution" category. Also, depending (...

Last updated: Mar 13, 2008   6:22 PM GMT  |  Blog: Adventures in Data Center Automation   |      DataCenter
PREV 1...10   20   30...32   33   34   35   36   37   38   39   40   41...   50   60   70...250 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: