Search Results | Application security
PREV 1...10   20   30...35   36   37   38   39   40   41   42   43   44...   50   60   70...251 NEXT
Sort by:  Most Relevant  |  Date
Protecting data in software testing environments

Blog  When you think about application or software security, you usually think about the bad guys outside your company trying to get in. But just as often, if not more, the danger comes from within with employees accessing personal data. The issue of protecting data comes up when testing applications. Te...

Last updated: Nov 19, 2008   7:00 PM GMT  |  Blog: Software Quality Insights
Power Users Push UC Envelope

Blog  Companies are typically slow and cautious to adopt new technologies. That is partially a function of due diligence and testing to ensure that any new technology or application will function properly and provide value before committing to adopting it. The larger the enterprise, the slower the process...

Last updated: Apr 11, 2008   3:49 PM GMT  |  Blog: Unified Communications: Click to talk
F5 caps off growth plans with acquisition of Nginx

Blog  The privately held Nginx will be acquired for a total enterprise value of approximately 500 million. Nginx points to its open source community as one of the most attractive elements of the combination of the two firms. F5 also says that open source (and user community interaction) is a core part...

Last updated: Mar 12, 2019   9:30 AM GMT  |  Blog: Open Source Insider
Garter: in applications, it's design that makes the difference

Blog   Gartner is hosting an application architecture, development & integration summit 2011 in London on June 16 this year. So what right? Gartner does this all the time doesn't it? Well, yes it does -- and this one isn't that much different on the face of it. This is the usual corporate shindig w...

Last updated: Apr 20, 2011   7:07 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Vulnerability management programs need an upgrade for the cloud era

Blog  Gone are the days of simple, easily secured corporate networks. The proliferation of cloud computing, virtualization and containers means that the network is changing constantly, said Nate Palanov, solutions marketing manager, vulnerability management, at Rapid7. More employees work remotely on sma...

Last updated: Apr 27, 2018   3:11 PM GMT  |  Blog: TotalCIO
Protecting the internet of things

Blog  Myriad articles have already been written regarding the internet of things. Advances in computing, communications and sensor technologies bring intelligence to previously passive objects, create new business models, drastically increase the volumes of data generated and improve the precision, accura...

Last updated: Oct 3, 2018   2:41 PM GMT  |  Blog: IoT Agenda   |      Cloud Security, Cyberattacks, cybersecurity
Oracle patches fix severe vulnerabilities in Database Server, Oracle Secure Backup

Blog  In Oracle's last Critical Patch Update, the company released 38 fixes for 21 affected products, most notably some repair work for Oracle 11g, Oracle Application Server and Oracle WebLogic Server. This batch marked the first time that three fixes for Oracle's core database had the highest vulnerabili...

Last updated: Jan 11, 2010   3:47 PM GMT  |  Blog: Eye on Oracle
Web app security scanners not finding everything, study says

Blog  In this age of Web 2.0-based attacks, companies are turning to a variety of Web application security scanners to help them find and fix security holes. But according to a study conducted by independent security consultant Larry Suto, some of these scanners are overlooking quite a few vulnerabilities...

Last updated: Oct 23, 2007   1:18 PM GMT  |  Blog: Security Bytes
Bayesian statistics

Blog  Bayesian statistics is a mathematical approach to calculating probability in which conclusions are subjective and updated as additional data is collected. Continued Quote of the Day "If we're going to live in a world where things are going to be driven by algorithms, we have to be able to conv...

Last updated: Sep 11, 2017   5:20 PM GMT  |  Blog: Word of the Day: Tech Definitions from   |      Cognitive computing, Machine learning, predictive modeling
Microsoft Patch Tuesday Update - 8th March 2011

Blog   With this Microsoft Patch Tuesday update, we see a relatively small set of updates in comparison to those lists of updates released by Microsoft for the month of January and February. In total there are three Microsoft Security Updates with the following rating; 1 Critical, and 2 rated Important....

Last updated: Mar 10, 2011   10:09 AM GMT  |  Blog: Cliff Saran’s Enterprise blog   |      Uncategorized
Twitter worm attack highlights social network flaws

Blog  A worm attack designed by a 17-year-old hoping to promote a rival social network wreaked havoc on Twitter, but also highlighted the importance of finding and repairing Web application flaws. A 17-year-old hacker claimed responsibility for attacking the Twitter microblogging service, crippling thou...

Last updated: Apr 14, 2009   1:37 PM GMT  |  Blog: Security Bytes
Edge & the datacentre: scope considerations for developers

Blog  This is a guest post for the Computer Weekly Developer Network written by Chris Carreiro in his capacity as CTO of ParkViewat Park Place Technologies -- the company is a specialist in datacentre maintenance with global staff on every continent. Carreiro says that he thinks theIT trade press has...

Last updated: Jun 26, 2019   5:21 AM GMT  |  Blog: CW Developer Network
NIST issues virtualization security guidelines

Blog  Sure, server virtualization has been around for a while and is very popular in IT. But you know a technology has really hit the big time when it gets its own national standards. The National Institute of Standards and Technology (NIST) this week released its virtualization security guidelines. The ...

Last updated: Feb 4, 2011   3:15 PM GMT  |  Blog: The Virtualization Room
Secure database passwords in PHP

Answer  I have a PHP application that makes a database connection but it also has a login / password. I'm using a minimum permission login for the app so the PHP just needs to know that login / password. What would be the best way to secure that password? I don't want to write in PHP code.

Last updated: Aug 19, 2015   4:00 PM GMT   |    Database, Passwords, PHP
Network monitoring tools

Answer  I have many monitoring tools for our environment that monitor equipment (snmp), network traffic (netflow, packet analysis), and security (simms), and point products for applications such as exchange. What tools are available to consolidate this information so that it can be displayed and reported to...

Last updated: Jan 22, 2009   4:44 PM GMT   |    Network monitoring
Which course should I do next: MCSE or MCITP?

Answer  I did systems development course which included mobile application development, web development, database and Java (Java2me, EE, SE) and I also did system dupport which included networking, A+, N+ and basic computer security now I'm caught in the mist I don't know which course to do next MCSE or MCI...

Last updated: Feb 3, 2015   12:30 AM GMT   |    IT careers, MCITP, MCSE
Administrator and user accounts on Windows Server 2008

Answer  I have an administrator account and a user account on a server 2008. I want to be more secure and log in only as the admin when I have to. Can I stay logged in as the user and still launch applications with elevated admin privileges? Are there shortcuts I can create? And if yes, then how?

Alert if remote computer opens up an application

Answer  So, I'm currently a teacher in summer school with about 20 kids. They're all taking the final exams very soon. They will be taking the exam on one specific application. For security purposes, is there a tool that would notify me if a student opened up another app (other than the exam one)? Any ideas...

Last updated: Jul 24, 2018   11:48 AM GMT   |    Applications, Security
Compose/Comprise - Which is correct?

Blog  TheAWSportfolio ______ more than 100 services, including those for compute, databases, infrastructure management, application development and security. a. comprises b. composes   Answer: A Comprise means "is made up of" or "consists of." Compose means "make up" or "make." A good way...

Last updated: Mar 20, 2018   4:35 PM GMT  |  Blog: Writing for Business
Stop fearing your smartphone: Mobile encryption & your security policy

Blog   From possibly causing cancer to posing a major security risk to the enterprise, the smartphone just can't cut a break. The truth is, smartphones are here to stay, especially in the enterprise. Like many other IT versus the world conflicts, the solution isn't a yes or no policy to their usage, but ...

Last updated: Sep 22, 2010   8:21 PM GMT  |  Blog: Enterprise IT Watch Blog
PREV 1...10   20   30...35   36   37   38   39   40   41   42   43   44...   50   60   70...251 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: