Search Results | Application security
PREV 1...10   20   30...34   35   36   37   38   39   40   41   42   43...   50   60   70...251 NEXT
Sort by:  Most Relevant  |  Date
i5 virus contest over, but the game continues on

Blog  System i5 security vendor Bytware Inc. has wrapped up its i5 online game, where contestants navigated YouTube videos and searching for clues on different Web sites to solve a fictional System i security mystery, all the while learning about PHP and i5/OS security. The grand prize winner, who gets a...

Last updated: Jan 29, 2008   2:53 PM GMT  |  Blog: The iSeries Blog
Microsoft Patch Tuesday Compatibility Report from ChangeBASE

Blog   Application Compatibility Update By: Greg Lambert   Executive Summary With this November Microsoft Patch Tuesday update, we see again a relatively small set of updates. In total there are 4 Microsoft Security Updates; 1 with the rating of Critical, 2 with the rating of Important, and 1...

Last updated: Nov 8, 2011   11:22 PM GMT  |  Blog: Cliff Saran’s Enterprise blog   |      Application Compatibility, Applications, Migration
MSDTC error with database/Windows Server 2003

Answer  I'm using two server 1.Application server (Windows XP Pro SP2) and 2.Database server (Windows Server 2003). When execute an application that will connect to my machine for database access and next it'll connect to DB server, at this time it produce "Communication Underlying Transaction has failed"....

Last updated: May 17, 2009   7:17 AM GMT   |    Database connectivity, Microsoft Windows, Microsoft Windows Server 2003
Database Newbie

Answer  I'm quite new to database security and MS SQL server 2005 and 2008 and was hoping to find some extra sites or books to help as I am currently writing an application to send OS info and service tags to our SQL server. I obviously can t have the SQL server directly on the internet with an open port bu...

Last updated: May 27, 2008   10:00 PM GMT   |    Database, Database security, SQL Server
Forecasts for 2016

Blog   Heavy demands for research and consultancy have restricted my blog postings this year. It's a reflection of the unrelenting growth in anything connected with cyber security. My New Year's resolution however will be to return to regular blogging. A year ago I forecast that the Internet of Things wo...

Last updated: Dec 22, 2015   3:36 PM GMT  |  Blog: David Laceys IT Security Blog   |      Artificial intelligence, Big Data, Bitcoin

Answer  UPDATE YOUR AREAS OF EXPERIENCE The following categories have been added to the AS400 ? iSeries section. Application development Systems management PC/Windows connectivity groupware & e-mail Career Opportunities for iSeries These categories were added last week: Backup & recovery Security Print...

Last updated: Dec 22, 2005   6:47 AM GMT   |    AS/400, Backup and Recovery, CLP
Security Metrics

Blog  I'm in the process of putting together some useful security metrics to report up to the senior management of my organisation. This is one area of the industry that, in my opinion, is sorely lacking in good, detailed guidance, on what to report and how to report it. One of the better references I've...

Last updated: Sep 12, 2007   6:00 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Security management
Securosis adds Security Incite, Rothman to its roster

Blog  Analyst and research firm Securosis announced today that it will merge with Security Incite, the popular blog and analysis site founded by Pragmatic CSO author Mike Rothman. Everything will remain under the Securosis brand, says founder and CEO Rich Mogull, a former Gartner analyst, who along with ...

Last updated: Jan 4, 2010   2:55 PM GMT  |  Blog: Security Bytes
TechTarget's weekly roundup (12/1 - 12/8)

Blog   IBM image via Shutterstock Has IBM beat out Amazon and Microsoft with its Docker partnership? Tune into this week's roundup to find out. 1. IBM hitches a ride on the Docker bandwagon - Ed Scannell (SearchCloudComputing) Hoping to get a leg up on Amazon and Microsoft, IBM partners with Docker to c...

Last updated: Dec 8, 2014   2:40 PM GMT  |  Blog: Enterprise IT Watch Blog   |      Data Center, EMM, IBM
Webinar on developing a user-centric approach to cloud security

Blog   From a user perspective, the term cloud refers to applications and services that are accessed via a browser, with no software or other agents needed to be installed on the device used to access them. From a provider perspective, there are many intricacies in setting up and managing such services, i...

Last updated: Jan 14, 2011   2:39 PM GMT  |  Blog: Bloor Security   |      Cloud Computing, Data protection, End user security
Cisco snaps up Securent

Blog  Cisco Systems on Thursday said it agreed to buy security software maker Securent for about $100 million. Cisco described Securent's policy management software as allowing enterprises to administer, enforce, and audit access to data, communications, and applications in heterogenous IT environments. ...

Last updated: Nov 1, 2007   11:14 PM GMT  |  Blog: Security Bytes
Microsoft Security Essentials

Blog  Well Microsoft finally released a free Antivirus and Malware application, and I must say, its clean, not overly processor intensive, and gets the job done. I personally endorse it, as I have been using it for some time and am very pleased. Microsoft Security Essentials provides real-time protection ...

Last updated: Feb 26, 2010   3:18 AM GMT  |  Blog: The Real (and Virtual) Adventures of Nathan the IT Guy
How to get real cloud security skills?

Answer  We are all aware of cloud computing and its adoption in the industry very well. Cloud computing has completely transformed the traditional way of using, storing, and sharing information and applications. Due to a higher number of advantages organizations are rapidly implementing cloud services. The ...

Last updated: Jun 21, 2018   1:04 AM GMT   |    , Cloud Computing, Cloud Security
Unstoppable Copier

Blog  What is it you say? Think of it as a robocopy that just copies everything... including security settings Download the app, run it, set the source, then the target and let er rip. The application will not stop, it will copy everything, if the file is completely locked it will skip it, but it will...

Last updated: Oct 10, 2008   4:13 PM GMT  |  Blog: The Real (and Virtual) Adventures of Nathan the IT Guy   |      HTTP
Nokia has no plans for the enterprise - Just wait and hope consumerisation works

Blog   A spokesperson for Nokia at CES 2012 said that Nokia are concentrating on the consumer market and don't have any plans for the business market because they believe that consumerisation is becoming so strong that there will not be a need to seperate the markets in the near future.He said that this w...

Last updated: Jan 12, 2012   8:01 AM GMT  |  Blog: Inspect-a-Gadget   |      nokia
TechTarget's weekly roundup (1/26 - 2/2)

Blog   Apple image via Shutterstock Do you think Apple's biometric data will be secure? Find out in this week's roundup. 1. Apple eyes cloud storage for Touch ID biometric data - Rob Wright (SearchCloudSecurity) According to a new patent application, Apple is looking to expand its Touch ID biometric ver...

Last updated: Feb 2, 2015   3:56 PM GMT  |  Blog: Enterprise IT Watch Blog   |      Apple, Docker, Internet of Things
TechTarget's weekly roundup (9/18 - 9/25)

Blog   Security image via FreeImages For close to one month, CCleaner malware was spread to users via an infected software update. Check out the total impact of the malware in this week's roundup. 1. CCleaner malware spread via supply chain attack - Michael Heller (SearchSecurity) CCleaner malware was s...

Last updated: Sep 25, 2017   12:51 AM GMT  |  Blog: Enterprise IT Watch Blog   |      Android, Flash, Mainframe
Protecting data in software testing environments

Blog  When you think about application or software security, you usually think about the bad guys outside your company trying to get in. But just as often, if not more, the danger comes from within with employees accessing personal data. The issue of protecting data comes up when testing applications. Te...

Last updated: Nov 19, 2008   7:00 PM GMT  |  Blog: Software Quality Insights
Power Users Push UC Envelope

Blog  Companies are typically slow and cautious to adopt new technologies. That is partially a function of due diligence and testing to ensure that any new technology or application will function properly and provide value before committing to adopting it. The larger the enterprise, the slower the process...

Last updated: Apr 11, 2008   3:49 PM GMT  |  Blog: Unified Communications: Click to talk
F5 caps off growth plans with acquisition of Nginx

Blog  The privately held Nginx will be acquired for a total enterprise value of approximately 500 million. Nginx points to its open source community as one of the most attractive elements of the combination of the two firms. F5 also says that open source (and user community interaction) is a core part...

Last updated: Mar 12, 2019   9:30 AM GMT  |  Blog: Open Source Insider
PREV 1...10   20   30...34   35   36   37   38   39   40   41   42   43...   50   60   70...251 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: