Search Results | Application security
PREV 1...10   20   30...40   41   42   43   44   45   46   47   48   49...   50   60   70...251 NEXT
Sort by:  Most Relevant  |  Date
How can humans navigate 2.5 billion gigabytes of machine data a day?

Blog  IBM's software intelligence promotion du jour is focused on transforming how organisations engage with "business content" and make it more usable. Business content? Could a more generic and meaningless term be possible? No no wait a moment -- this terminology often refers to big data machine-g...

Last updated: Jun 25, 2014   6:28 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
iPhone targets the enterprise with new apps, Cisco VPN client

Blog  The iPhone was already doing a pretty good job creeping into the enterprise, despite early concerns about its security and manageability. Now, Apple is taking steps to allay those fears; yesterday, the company unveiled new features designed to help the iPhone better fit into the enterprise. Early c...

Last updated: Mar 8, 2008   0:09 AM GMT  |  Blog: The Network Hub

Blog  NetOps, also referred to as NetOps 2.0, is a networking approach that encompasses the use of DevOps tools, methods and techniques to create an agile, scalable and programmable infrastructure capable of delivering business-critical applications and services rapidly and efficiently. Continued Quot...

Last updated: Dec 17, 2018   7:51 PM GMT  |  Blog: Word of the Day: Tech Definitions from
Hacker Dojo- Sushi and Sake Web Application Penetration Event

Blog   We are having a FREE Hacking Dojo that I will be leading in San Diego next week. Imperva has provided a WAF. We will be utilizing Webgoat & Webscarab from the Open Web Application Security Project (OWASP) organization. 1 version of Webgoat will be in front of the WAF, and the other will ...

Last updated: Jan 20, 2010   7:51 PM GMT  |  Blog: Harmonizing Regulatory Compliance and Risk Management   |      breach, Cross-Site Scripting, imperva
Mozilla plugs protocol handling flaw

Blog  Mozilla upgraded Firefox this week to plug a flaw that could allow an attacker to bypass security and open URIs using the Firefox command line interface. The protocol handling errors were discovered by security researcher Billy Rios. Mozilla released Firefox 3.0.1 and Firefox Rios said a...

Last updated: Jul 17, 2008   1:00 PM GMT  |  Blog: Security Bytes
Irregularities and Illegal Acts Agreed-Upon Procedures Assessments - Part VII

Blog  SOD controls are designed to reduce the opportunities for errors, mistakes, omissions, irregularities, and illegal acts perpetration and concealment. SOD is a primary internal control measure utilized for manual and automated systems. An autonomous function for computer data entry may exist within...

Last updated: Mar 30, 2012   8:48 PM GMT  |  Blog: IT Governance, Risk, and Compliance
How do we manage the BYOD boom, at the technical end?

Blog  Much though we may deride our government's best efforts to drag the tea and biscuit-chomping safe-job-for-life civil servants that line Victoria Street into the 21st Century, the UK public sector does appear to be trying to embrace the new world of information technology effectively. Not only do we...

Last updated: Feb 16, 2012   5:55 AM GMT  |  Blog: CW Developer Network   |      "software application development", BYOD, government
More Clouds with a Chance of Storms

Blog  Question: What exactly are the top security issues that cloud vendors need to address? Somehow I am getting a sense of dj vu on cloud security. Don't get me wrong folks, but the cow is already out of the barn. After all, more than 69% of all consumer Internet users have used at least one ...

Last updated: Jul 15, 2009   7:00 PM GMT  |  Blog: Ask the IT Consultant
Do you use TLS or client certificates for authentication? Beware of new MITM vulnerability

Blog  As Michael Morisy of ITKE recently posted, New SSL security hole allows man-in-the-middle attacks, a new SSL vulnerability has been announced. What you need to know about this vulnerability is that it most affects TLS (transport layer security) sessions using client authentication certificates. This...

Last updated: Nov 5, 2009   4:50 PM GMT  |  Blog: IT Trenches
Identity management for federated SOA

Blog  Alongside the Gartner Application Architecture, Development & Integration Summit 2009 in Las Vegas this week, SOA security vendor, Forum Systems released a new identity broker hardware appliance, Forum STS. With an increasing number of enterprises expressing interest in moving SOA into cloud co...

Last updated: Dec 11, 2009   9:12 PM GMT  |  Blog: Microservices Matters
Drobo launches mobile file sharing for unstructured data

Blog  Drobo this week unveiled DroboAccess to enable mobile file sharing on its NAS boxes. DroboAccess lets customers access and share files stored on DroboNAS from any device or location. The capability is available on the Drobo 5N for small businesses and the Drobo B810n for larger configurations. ...

Last updated: Apr 8, 2016   8:08 PM GMT  |  Blog: Storage Soup   |      Drobo, file sharing
New programmer pow-wow for coders paranoid about Android

Blog  Information security consultancy MWR InfoSecurity is hosting a DevSecCon workshop. A what? Oh sorry, DevSecCon means Developer Security Conference, obviously. The DevSecCon (Ed - surely DevSecPowWow would have worked better no?) is labelled Android Security Within the Development Lifecycle. S...

Last updated: Sep 22, 2015   1:29 PM GMT  |  Blog: Open Source Insider   |      Uncategorized
Microsoft Security Essentials Rocks for Virus Protection.

Blog  I have been using Microsoft Security Essentials on all my Windows machines. It works great and stops all virus infections. It is free for small business and personal use. In comparision to other products - including paid products this comes out on top. It works great on low powered Windows machines...

Last updated: Dec 20, 2010   8:09 PM GMT  |  Blog: Karl's Windows Admin Tips & Tricks
Biggest Patch Tuesday Ever: October, 2010

Blog  Gadzooks! I almost fell out of my chair yesterday, when I checked Windows Update just after lunch, as is my usual wont on Patch Tuesdays. There were no less than seventeen (17!!) updates waiting for me to download onto my production machine, and as I worked my way through my notebook (I'm currently ...

Last updated: Oct 13, 2010   2:34 PM GMT  |  Blog: Windows Enterprise Desktop
Opinion: LinkedIn hacking incident betrays users trust

Blog  Security awareness training often teaches the importance of password length and password complexity, but these best practices, as it turns out, may be creating a false sense of security. Even worse, users who cooperate and create long, complex passwords may feel betrayed when the organizations they ...

Last updated: Jun 14, 2012   2:49 PM GMT  |  Blog: Security Bytes
Dreaming of PaaS

Blog  Dreamforce is the snazzy name for's annual show-and-tell extravaganza. It's a pretty stylish event too: rock bands, parties, and big theatrical presentations. I didn't go but if you're working for an SFDC customer it's difficult not to get caught up in the hype. is the assoc...

Last updated: Nov 6, 2008   1:00 PM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Misc, Security management
IBM announces System z "solution editions"

Blog  IBM has announced seven different hardware and software packages that include the System z mainframe and target specific application workloads such as disaster recovery and data warehousing. The move is an effort by Big Blue to keep the mainframe relevant and attractive for whose who might otherwis...

Last updated: Aug 18, 2009   5:35 PM GMT  |  Blog: Mainframe Propeller Head
Executives Leery, Disappointed About Virtualization, Cloud

Blog  Vendor surveys are always dicey; it's remarkable how often survey responses just happen to line up perfectly with the vendor's product line. But Symantec's survey on Virtualization and Evolution to the Cloud seems on the up-and-up, if only because the results are such a bummer to virtualization and ...

Last updated: Jun 19, 2011   3:08 AM GMT  |  Blog: Yottabytes: Storage and Disaster Recovery
Passed F5 101- Application Delivery Fundamentals exam

Blog  Today by the grace of Almighty I passed the F5 101- Application Delivery Fundamentals exam. It was a quite interesting experience I had especially, when I tried a non-Cisco certification exam. As we all know F5 is a leader in the field of Application delivery controllers. F5 stands out to be a lead...

Last updated: May 5, 2015   7:04 PM GMT  |  Blog: Network technologies and trends   |      F5, Gartner Magic Quadrant
Ribbon ties developers to connected comms on AT&T API marketplace

Blog  US telecoms stalwart AT&T is expanding its Application Programming Interface (API) marketplace connectivity points. The AT&T API Marketplace (its an online store zone, not a real market, obviously) hosts pre-packaged software code for developers to embed into communications-related websi...

Last updated: Mar 19, 2019   11:16 AM GMT  |  Blog: CW Developer Network
PREV 1...10   20   30...40   41   42   43   44   45   46   47   48   49...   50   60   70...251 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: