Search Results | Application security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...248 NEXT
Sort by:  Most Relevant  |  Date
Mobile device protection: OWASP working on a Top 10 mobile risks list

Blog  When I arrived home from RSA Conference 2012 after attending a number of panel discussions about mobile device protection, mobile security threats and ways IT teams can build control and visibility into their employee smartphones, I left feeling that many of the session panelists overhyped the risks...

Last updated: Mar 21, 2012   4:28 PM GMT  |  Blog: Security Bytes
Validating 'unproven assumptions' F5 on the state of application delivery

Blog  F5 Networks is a firm aiming to stake a claim for itself. The Application Delivery Controller (ADC) and network technology firm is now on its second annual State of Application Delivery survey. This survey promises to provide insight into the current state of application delivery -- as well as c...

Last updated: Jan 18, 2016   1:54 PM GMT  |  Blog: CW Developer Network   |      Uncategorized
A flaw in the cloud is still a flaw: How do your SaaS apps stand up?

Blog  Call me a cynic, but I'm still skeptical when it comes to these SaaS "solutions" that are nothing more than a traditional Web application with a pretty front-end. You see, with traditional systems come traditional vulnerabilities - namely Web application vulnerabilities like cross-site scripting, SQ...

Last updated: Oct 13, 2010   1:23 PM GMT  |  Blog: Enterprise IT Watch Blog
Buggy legacy software is an 'ugly elephant'

Blog  Co-founder and CTO of Veracode Inc. Chris Wysopal has recently been interviewed on the subject of how difficult is it to address legacy software in an organisation. While Wysopal's comments make great reading, one has to question whether legacy software is always a "challenge" and therefore a probl...

Last updated: May 23, 2012   9:00 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Qualys ups security automation with a bit of Swagger

Blog  Cloud security firm Qualys, like every vendor today, is pushing the automation mantra. The companys Web Application Scanning (WAS) 6.0 now supports Swagger version 2.0 to allow developers to streamline [security] assessments of REST APIs and get visibility of the security posture of mobile appli...

Last updated: Apr 17, 2018   9:28 AM GMT  |  Blog: CW Developer Network   |      Qualys
Magic Software: HTML5 is "very susceptible" to SQL injection attacks

Blog  The security of the applications we use on our mobile devices is a subject of increasing concern. As smartphones get smarter, tablets get easier to swallow and the cloud powers all of these "slim" devices with all the back-end power that they do not naturally come with at birth due to their small f...

Last updated: Jun 19, 2012   5:41 AM GMT  |  Blog: CW Developer Network   |      Magic Software, Mobile Application Development, SQL injection
Symantec launches mobile security evaluation, app assessment services

Blog  Security assessment reviews an organizations mobile security policies and technologies, evaluating the mobile security posture against a set of 15 core elements. Symantecs consulting team is launching a mobile security assessment service, designed to assess a business mobile security polic...

Last updated: Dec 6, 2011   3:27 PM GMT  |  Blog: Security Bytes

Blog  SecOps is a management approach that connects security and operations teams, similar to how DevOps unifies software developers and operations professionals. Continued Quote of the Day "To help transition to a DevSecOps model to protect enterprises, security teams need to identify key stakeholder...

Last updated: Aug 7, 2019   4:43 PM GMT  |  Blog: Word of the Day: Tech Definitions from
Mobile application threats, mobile privacy woes ahead, expert says

Blog  Look for a movement to weed out malicious mobile applications through mobile application scoring systems, according to Verizons ICSA Labs, which issued a list of security predictions for 2012. By Robert Westervelt, News Director Mobile malware and mobile application threats could pose major sec...

Last updated: Dec 15, 2011   2:06 PM GMT  |  Blog: Security Wire Weekly
Cybersecurity 2010: Looking back and lessons learned - Part 2

Blog  Pete Lindstrom, a research director at Spire Security joins the editorial team to talk about the top IT security news stories of 2010. Microsofts legal action against Waledac botnet: Federal judge grants Microsoft the ability to shut down hundreds of domain names tied to the Waledac botnet. McA...

Last updated: Dec 27, 2010   8:40 PM GMT  |  Blog: Security Wire Weekly
Microsoft Patch Tuesday: 8th June 2010

Blog   With this June Microsoft Patch Tuesday Security Update, we see a larger number security updates with 10 updates to Windows XP and Windows 7 desktops including 3 updates rated as Critical, 6 rated as Important and one patch update that has a Microsoft rating of Tampering. Unfortunately, all patc...

Last updated: Jun 10, 2010   11:41 AM GMT  |  Blog: Cliff Saran’s Enterprise blog   |      Application Compatibility, Applications, ChangeBase
Reflex Security releases Virtualization Management Center for VM management

Blog  This post was written by assistant editor Caroline Hunter At VMworld 2008, virtualization security leader Reflex Security Inc. will release Virtualization Management Center (VMC), a product that makes virtual machine (VM) activity visible to security administrators. By pro...

Last updated: Sep 16, 2008   2:34 PM GMT  |  Blog: The Virtualization Room
Join the security debate: an ongoing challenge with new dimensions

Blog   Software security has been and still continues to be a top line issue for most organisations. Yet software development teams still continue to produce and deploy insecure code and applications with serious consequences for their brand, reputation and, of course, the finances of their customers and ...

Last updated: Oct 19, 2010   6:32 PM GMT  |  Blog: CW Developer Network   |      Uncategorized
What to expect from BlackBerry Developer Summit Europe 2017

Blog  Brexit means Brexit and BlackBerry means enterprise-level application of the secure communications and mobile productivity platform technologies now that the company's once oh-so-consumer level focus has shifted upwards. Cracking London CrackBerry BlackBerry software application development coder wi...

Last updated: Mar 8, 2017   4:07 PM GMT  |  Blog: CW Developer Network
Intel & Symantec tout app virtualization

Blog   Intel Corp. and Symantec Corp. executives touted the benefits of application virtualization in a roundtable discussion with reporters Thursday in San Francisco. Virtualization at the application level separates the application from the operating system, preventing applications from modifying system...

Last updated: Jul 18, 2008   6:15 PM GMT  |  Blog: Security Bytes
Sumo Logic fills crack in cloud DevSecOps ring

Blog  Describing itself as a machine data analytics company, Sumo Logic is aiming to put a new CAPS C into a technology market already used to Continuous Integration, Testing, Deployment and Delivery. Sumo Logics Continuous is Continuous Intelligence in cloud-native application deployment scenarios. ...

Last updated: Jan 29, 2018   9:55 AM GMT  |  Blog: CW Developer Network
Open Source application security: do we have a problem or not?

Blog   Software-as-a-Service (SaaS) security vendor Veracode has conducted a real world survey, sampling billions of lines of code across various types of applications (including open source) and has flagged up some substantial differences between the security levels of open source software and proprietar...

Last updated: Jun 17, 2010   6:37 PM GMT  |  Blog: Open Source Insider   |      Uncategorized
2011 security wins and fails - Android app security, data breach management

Blog   In part one of this two-part podcast, special guest Andrew Jaquith of Perimeter E-Security joins the SearchSecurity editorial team in exploring the highs and lows of 2011 for the security industry. Mobile device platforms were built with security in mind, but in 2011 cybercriminals have had some su...

Last updated: Dec 22, 2011   8:00 PM GMT  |  Blog: Security Wire Weekly
Welcome to Security Week at DCAC

Blog  With the announcement of the CPU "issues" in the last week or so, this week has quickly become Security Week at DCAC with our blogging. This week will all be capped off without security webcast this Friday. If you follow the DCAC Blog, you'll see different security topics from everyone this week, ...

Last updated: Jan 15, 2018   4:00 PM GMT  |  Blog: SQL Server with Mr. Denny   |      Security, SQL
Emerging Cloud Security Products

Blog  Question:What are some emerging cloud security products and approaches that assuage IT and Business executive concerns? New technologies require new approaches; the cloud is a new technology that has already had a profound effect on IT service delivery. As I discussed in a previous blog on the ...

Last updated: Oct 17, 2011   4:00 PM GMT  |  Blog: Ask the IT Consultant
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...248 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: