Search Results | Application security
PREV 1...10   20   30...37   38   39   40   41   42   43   44   45   46...   50   60   70...250 NEXT
Sort by:  Most Relevant  |  Date
Overheard: Real ID -- Don't trust anyone under 50

Blog   The Associated Press explains why the U.S. Department of Homeland Security is subtly dissing people over 50: "The over-50 exemption for Real ID was created to give states more time to get everyone new licenses, and [now comes the ugly part] officials say the risk of someone in that age group bei...

Last updated: Jan 16, 2008   1:16 AM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
Dig into these IOT development tips

Blog  IoT is the latest thing in embedded systems technology, and its not a fad. IT research firm Gartner Inc. projects installation of 26 billion IoT units by 2020, resulting in $1.8 trillion in revenue. IoT is not a consumer-only technology, either. Enterprise architects should plan now for the entra...

Last updated: May 21, 2015   8:54 PM GMT  |  Blog: Microservices Matters   |      API, API management, Application security
MS Exam 70-620 TS: Configuring Microsoft Windows Vista Client

Blog  In digging up the info on this, the first in my series of four MCTS and MCITP Vista-related exams that I'll be covering over the next week or so, I discovered that Microsoft has finally changed the format for its exam pages. I've been tuning into these documents since the late 1990s and it's nice t...

Last updated: Nov 7, 2008   8:55 PM GMT  |  Blog: Windows Enterprise Desktop   |      HTTP
History on the Go: New mobile apps engage students

Blog  Recently, SSQ spoke with Marc Schulman, an application developer with MultiEducator, Inc., to learn more about new iPad apps that enable students to study American history through their mobile devices. These apps allow for interaction with the material in ways that text books simply cant matc...

Last updated: Oct 4, 2011   3:15 PM GMT  |  Blog: Software Quality Insights
Cirba sets cloud decision control for the heart of the sun

Blog  If software runs the world, then shouldn't software-defined infrastructure control solutions form the mantle and liquid magma at the core of the planet? This is perhaps the gambit that Cirba is going for with its workload routing and management support for hybrid cloud environments offerings. Ci...

Last updated: Feb 12, 2016   4:39 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Department of Health and Connecting for Health security flaws

Blog  There seems to be a belief in some parts of the Department of Health that truth in modern-day public communications is pass. The Department's Medical Training Application Service for junior doctors was taken out of service soon after Channel Four News showed that doctors could easily see each oth...

Last updated: Apr 27, 2007   12:35 AM GMT  |  Blog: Public Sector IT   |      accountability, IT security
The Compliance Oriented Architecture - are we there yet?

Blog   Over a decade ago, Quocirca looked at the current means of securing data, and decided that there was something fundamentally wrong. The concept of solely relying on network edge protection, along with internal network and application defences misses the point. It has always been the data that mat...

Last updated: Jan 13, 2016   1:25 PM GMT  |  Blog: Quocirca Insights   |      Uncategorized
COM+ printing across untrusted domains

Answer  I have a COM+ application that needs tosend a documentto a printer on a different domain (that is not set up as trusted). I have installed the printer, with the username on that domain on the Windows 2003 server, under a user on the local domain with the same username and password. I can print t...

Last updated: Aug 20, 2009   11:59 AM GMT   |    Active Directory, Active Directory interoperability, COM
First GROAN of the New Year

Blog  I was doing an audit today (I know, the term "audit" should only be used in connection with a financial exam, but everybody but Public Accountants use it this way) and examining the users inside a SQL database that holds one heck of a lot. I wish more IT Auditors would start looking inside databases...

Last updated: Jan 8, 2009   6:10 PM GMT  |  Blog: Sister CISA CISSP
How do I generate a secure token for a mobile app to protect its data?

Answer  I recently developed a back end REST API for my mobile application and now I'm looking to implement token-based authentication so I avoid having the user to login every run on the application. My first thought was using basic authentication over SSL. So once the user sends the credentials through th...

Last updated: Jan 7, 2015   6:00 PM GMT   |    Authentication, Mobile applications, Security tokens
rugged DevOps

Blog  Rugged DevOps is an approach to software development that places a priority on making sure code is secure before it gets to production. Continued Quote of the Day "It's possible to develop code that's even more secure than before the move to DevOps if you approach DevOps and security properly." ...

Last updated: Feb 15, 2018   9:27 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
Wi-Fi Protected Access (WPA)

Blog  Wi-Fi Protected Access (WPA) is a security standard for wireless internet connections. It improved upon and replaced the original Wi-Fi security standard, Wired Equivalent Privacy (WEP). Continued Quote of the Day "The most common protocol used to connect IoT devices via Wi-Fi is WPA2 -- also kn...

Last updated: May 10, 2018   6:34 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com
Confidentiality

Blog  A friend of mine who is an attorney was showing me his website. His blog was all about credit card fraud. I wrote a quick article for him about PCI Governance. It seems that every few years we hear about a major credit card hack. This year November 12, 2011 USPS notified 5400 store customers...

Last updated: Nov 19, 2011   10:08 PM GMT  |  Blog: Modern Network Architecture
We can't write secure code

Blog  David Lacey makes the important point that writing secure software is "not just about cutting secure code or developing better testing tools. We need to get things right much earlier in the development process." It's a subject I've been harping on about for some time, with many references to excelle...

Last updated: May 16, 2008   8:00 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Compliance, Network security, Security management
A view on security budgeting

Blog  There's a lot of discussion out in the blogs about security budgeting. Mike Rothman compares security budgeting to "black magic", while Gunnar Peterson discusses a more practical (for most) alignment of security budget with the IT budget. I'm not sure that you could really prove that either approac...

Last updated: Oct 6, 2007   7:00 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      budget, Risk assessment
Cisco network architecture targets CIOs. Will they buy it?

Blog  Cisco network architecture now has a new layer for the multi-cloud age and the vendor wants CIOs to know about it. Technology architectures, sometimes derided as "marketectures," have been around for ages. IBM was famous for them in the 1970s and 1980s, pushing Micro Channel Architecture, Systems N...

Last updated: Nov 28, 2018   2:16 PM GMT  |  Blog: TotalCIO   |      architecture, CIO, Cisco
Is facial recognition the killer app for AI?

Blog  The power of facial recognition has knocked at my door. My Nest Cam IQ Outdoor sends me a notification when a stranger stops at my front door. Facial recognition has the power to transform us to tightly integrated connected communities as security cameras scale across our neighborhoods and cities. ...

Last updated: Aug 29, 2018   4:26 PM GMT  |  Blog: IoT Agenda   |      ai, airport, Artificial intelligence
Securing your supply chain is as important as securing your devices

Blog  The Ponemon Institute published its annual report on third-party IoT risks in May, 2019. The report focused on identifying what companies do not know -- or understand -- about the risks inherent to IoT devices and applications, particularly when used by third parties. The report drives home the fact...

Last updated: Oct 9, 2019   6:35 PM GMT  |  Blog: IoT Agenda   |      cybersecurity, Internet of Things, iot
Security Maxims of a Different Breed

Blog  Search for "computer security maxims" on any of the top three search engines (Google, Yahoo, Bing) and my articles mostly dominate the results. So I was quite surprised that Security Now Episode #215, entitled "Security Maxims," gave no mention whatsoever of my contributions to this subject over the...

Last updated: Sep 30, 2009   9:43 PM GMT  |  Blog: Security Corner
Splunk .conf 2017: knowing me machine data, knowing you aha!

Blog  Machine data operational intelligence platform specialist Splunk has gone all Alan Partridge. The company known for its down-at-the-data-layer technologies and its tongue-in-cheek t-shirts now says it Partner+ Program initiative is delivering aha moments from machine data. The Splunk global ...

Last updated: Sep 25, 2017   2:10 PM GMT  |  Blog: CW Developer Network
PREV 1...10   20   30...37   38   39   40   41   42   43   44   45   46...   50   60   70...250 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: