Search Results | Application security
PREV 1...10   20   30...33   34   35   36   37   38   39   40   41   42...   50   60   70...250 NEXT
Sort by:  Most Relevant  |  Date
Is data security nothing more than wishful thinking?

Blog  It's not often that I read the showbiz bible Variety or the Hollywood Reporter when doing background research for a piece on cloud computing. Yet here we are -- again -- pondering the pervasive perniciousness of breaking intoentertainment-industry data assets. This time around it's HBO. A late Ju...

Last updated: Aug 2, 2017   5:37 PM GMT  |  Blog: Head in the Clouds: SaaS, PaaS, and Cloud Strategy   |      Application security, cybersecurity
WAN security concerns from the 2010 Verizon data breach investigations report

Blog   Today marks the release of thethird annual Verizon data breach investigations report for 2010. Verizon Businessbelieves more should be done in the telecom industry to increase information securityawareness. This is one of the reasons why they began conducting data breach surveys back in 2008....

Last updated: Jul 28, 2010   9:23 PM GMT  |  Blog: Window on WANs
Amazon not to blame for S3 cloud storage lapses

Blog  The Amazon Simple Storage Service (S3) has been giving big businesses and their customers -- big trouble. It was reported earlier this summer that high-profile companies left data in their S3 buckets exposed because the access control lists (ACLs) were configured to allow access from any user on...

Last updated: Nov 15, 2017   2:27 PM GMT  |  Blog: Storage Soup   |      Cloud Security, Cloud storage
Mobile network operators: Overcome IoT challenges using the power of SIM

Blog  The expansion of the Internet of Things (IoT) is a huge growth opportunity for vertical industries and mobile network operators (MNOs), but there are challenges and risks. The recent hacking of a Jeep while it was driving on a public road illustrates the risks to all IoT devices and segments. On the...

Last updated: Apr 8, 2016   2:36 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, SIM
VMware projected to save millions for Canadian Interior Health Authority

Blog  Palo Alto-based VMware Inc. announced this week that the Interior Health Authority (IHA) of British Columbia has standardized on VMwares virtualization and management suite VMware Infrastructure 3to improve manageability and performance of mission critical applications, and dramatically cut cos...

Last updated: Oct 8, 2008   2:37 PM GMT  |  Blog: Virtualization Pro
Citrix makes a security fix

Blog  Citrix has fixed a flaw in its MetaFrame Presentation Server, Presentation Server and Access Essentials that attackers could exploit to get unauthorized access to arbitrary ports. According to the French Security Incident Response Team (FrSIRT), the problem is an error in the Session Reliability se...

Last updated: May 23, 2007   11:16 AM GMT  |  Blog: Security Bytes
Bit9 releases top 10 vulnerable apps for 2007

Blog  The folks at endpoint security vendor Bit9 Inc. of Cambridge, Mass., released their list of top vulnerable applications for 2007. Most of the apps on the list can be downloaded by users and many have updates making them more secure. We'll probably see a number of security vendors come out with lists...

Last updated: Nov 1, 2007   8:10 PM GMT  |  Blog: Security Bytes
i5 virus contest over, but the game continues on

Blog  System i5 security vendor Bytware Inc. has wrapped up its i5 online game, where contestants navigated YouTube videos and searching for clues on different Web sites to solve a fictional System i security mystery, all the while learning about PHP and i5/OS security. The grand prize winner, who gets a...

Last updated: Jan 29, 2008   2:53 PM GMT  |  Blog: The iSeries Blog
Exploiting SAP DMS as Enterprise Document Management System

Blog  Storing all the key business documents in one place is the key purpose of having an Enterprise DMS (Document Management System). Single Source provides benefits of easy retrieval, increased visibility, one set of rules for managing documents, better control of documents. While Storing documents, sto...

Last updated: Jan 3, 2012   7:37 AM GMT  |  Blog: Enterprise IT Consultant Views on Technologies and Trends
SELinux now enabled in AppArmor's openSUSE

Blog   On Friday, Aug. 22, openSUSE announced that its newest version, 11.1, will support Security Enhanced Linux, or SELinux. Novells security tools, AppArmor and SELinux, have traditionally been considered intense rivals. In this interview, openSUSEs Andreas Jaeger, Roman Drahtmller and Matth...

Last updated: Sep 2, 2008   2:19 PM GMT  |  Blog: Enterprise Linux Log
Nothing is 100% secure, not even an iPhone

Blog  Last night, the FBI announced that it was dropping its litigation against Apple, because it had found an alternative way into the iPhone that had belonged to one of the San Bernardino terrorists. It proves, yet again, that nothing is ever completely, totally secure. Suing Apple simply became moot. ...

Last updated: Mar 29, 2016   5:49 PM GMT  |  Blog: Head in the Clouds: SaaS, PaaS, and Cloud Strategy   |      iPhone, Security
Cloud-native Platform Focus Areas

Blog  Earlier this month, I wrote a piece about the Architectural Considerations for Open Source PaaS and Container platforms. It was a follow-up to a series I wrote about 12 months earlier, looking at various aspects of these types of Cloud-native application platforms. Changes are happening quickly in ...

Last updated: Jul 31, 2016   3:17 PM GMT  |  Blog: From Silos to Services: Cloud Computing for the Enterprise   |      Application portfolio, CaaS, Cloud Foundry
Eslambolchizadeh backs Ixia for debugger beefiness

Blog  What is a software company without a dedicated developer division, tool, platform or at least T-shirt, right? Presumably this was some of the thinking that network-testing company Ixia (pron: icks-ee-ya) went through recently. The firm has now come forward with Ixia Developer (pron: dev-ell-op-er),...

Last updated: Jun 14, 2016   3:04 PM GMT  |  Blog: CW Developer Network
Open source HTML5 secure file sync for Android

Blog  File sync specialist SpiderOak has bolstered the Google Play Android app market with an open source secure sync tool. SpiderOak is emphasising the secure (no, really, really secure we really mean it) aspect of its technology by detailing the fact that at no point does the company ever store users' ...

Last updated: Jun 12, 2013   2:44 PM GMT  |  Blog: Open Source Insider   |      Android, Security, sync
Snowden talks encryption drawbacks; experts dish app consolidation tips

Blog  Is data encryption enough to ensure data protection? According to Edward Snowden, the answer is no. At Harvard University's fourth annual Symposium on the Future of Computation in Science and Engineering, which took place last week, Snowden joined security technology expert Bruce Schneier to talk op...

Last updated: Jan 30, 2015   7:31 PM GMT  |  Blog: CIO Symmetry   |      application consolidation, CIO, Data Encryption
SUSE CaaS Platform 3: ein fabelhaftes Container-Paket

Blog  Software-und System-Entwicklung (or, SUSE, to you and me) has been active this month and opened the box on SUSE CaaS Platform 3. SUSE CaaS is the acronym for the open source operating system companys Container-as-a-Service technology. The firm presents SUSE CaaS Platform as a route to packa...

Last updated: Jun 25, 2018   8:04 AM GMT  |  Blog: Open Source Insider
Borderless Networks: Accelerating the Workplace Transformation (Sponsored)

Blog  This sponsored guest is from Cisco Systems and was written byMark Leary, a Cisco seniorstrategistand Chief Marketing Officer - Network Systems. We work, live, play, and learn in a world that has no boundaries and knows no borders. We expect to connect to anyone, anywhere, using any device, to...

Last updated: Apr 23, 2010   3:29 PM GMT  |  Blog: Enterprise IT Watch Blog
Data orchestration: The key to accelerating IoT digital transformation

Blog  It's hard to judge the development of IoT to date as anything but a success story. According to IoT Analytics, there were 7 billion IoT devices worldwide in 2018, a number that is expected to grow to 22 billion by 2025. A key reason for this growth is IoT's ability to help enterprises implement digi...

Last updated: May 8, 2019   3:30 PM GMT  |  Blog: IoT Agenda   |      Data Management, data orchestration, Enterprise IoT
MVC 1.0: The perfect fit for microservice admin tools

Blog  The following is a transcript of the conversation TheServerSide's Cameron McKenzie had with Ivar Grimstad out hot topics in the Java ecosystem, with an emphasis on MVC 1.0 and the new security specification, JSR-375. [embed]https://cdn.ttgtmedia.com/rms/podcasts/ivar%20grimstad%20PRODUCED.mp3[/em...

Last updated: Nov 28, 2017   2:20 AM GMT  |  Blog: Coffee Talk: Java, News, Stories and Opinions
Securosis adds Security Incite, Rothman to its roster

Blog  Analyst and research firm Securosis announced today that it will merge with Security Incite, the popular blog and analysis site founded by Pragmatic CSO author Mike Rothman. Everything will remain under the Securosis brand, says founder and CEO Rich Mogull, a former Gartner analyst, who along with ...

Last updated: Jan 4, 2010   2:55 PM GMT  |  Blog: Security Bytes
PREV 1...10   20   30...33   34   35   36   37   38   39   40   41   42...   50   60   70...250 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: