Search Results | Application security
PREV 1...10   20   30...41   42   43   44   45   46   47   48   49   50...   60   70   80...251 NEXT
Sort by:  Most Relevant  |  Date
Don't say legacy applications, say LONGEVITY applications!

Blog  I wrote a blog post this week detailing what I called this misnaming of legacy applications, suggesting that we should instead call them 'longevity' applications - as essentially, they still work and should be looked upon as things of value. In an attempt to try and make this renaming of the term s...

Last updated: Apr 7, 2011   8:57 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
F5 framework targets slipshod IT delivery

Blog  Fragmentation is everywhere. Applications are fragmenting into cloud-based services, the Internet of Things is fragmenting (some would say 'cracking up') around a dispirited set disconnected systems with no clear base of standards and then mobile is fragmenting around the constant battle for market...

Last updated: Jan 29, 2015   10:32 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Sencha CEO: one (application deployment) size does not fit all

Blog  HTML5 desktop and mobile web application development company Sencha has released its Space 1.3 product. The software is intended to help deploy, manage and analyse business applications. Here's the justification for the product's existence: Organisations are increasingly tasked with meeting the ...

Last updated: Feb 13, 2015   9:29 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
WMOC#30 - Microsoft Security Threat Modeling Tool

Blog  MSDN - Download the New Microsoft Security Development Lifecycle (SDL) Threat Modeling Tool Dare Obasanjo - My Holiday Project: A Twitter Search Engine Built on Windows Azure Aaron Skonnard - Screencast: Configuring MEX endpoints Glenn Block - Using ExportProvider to customize container behavior ...

Last updated: Jan 7, 2009   4:56 AM GMT  |  Blog: Service Endpoint   |      Architecture, entity-framework, mex
Domino people and groups

Answer  Hello All From what I have been told when you access an application Domino adds up the length of all the names of groups that a person is a member of. If this value is less than 64kb all is fine, if the value is close to 64kb and the application has additional Domino Security roles, this may tip th...

Last updated: Feb 4, 2008   11:46 PM GMT   |    Lotus Domino
Get your Oracle 11g white papers here

Blog  Oracle has posted a bunch of technical information and white papers about Oracle Database 11g, which should become available for the Linux platform sometime this month. Most of the Oracle 11g white papers can be found here on Oracle's Web site. This collection covers a variety of topics, including ...

Last updated: Aug 8, 2007   3:45 AM GMT  |  Blog: Eye on Oracle
Mobility and IT security - time to worry or not?

Blog   How do you quantify the impact of mobility on IT security? That this is a challenge all organisations need to face up to cannot be doubted; a 2013 Quocirca research report, Digital identities and the open business, showed that 63% of businesses provide formal access to some of their business applic...

Last updated: Dec 11, 2013   9:26 AM GMT  |  Blog: Quocirca Insights   |      Uncategorized
Is software monetisation 2.0 a developer wake up call?

Blog  As a committed reporting resource dedicated to examining the manifold machinations and manoeuvrings across the software application developer landscape, the Computer Weekly Developer Network recently sat down with the communications team for information security company SafeNet. Discussions centr...

Last updated: Sep 17, 2014   6:01 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
AT&T grows its roster of cloud partnerships with CSC deal

Blog  Despite telcos' best efforts to portray themselves as more than stodgy phone companies, enterprises looking into cloud services typically don't consider them as their primary choice of provider. In fact, only 21% of North American respondents in TechTarget's 2013 IT Priorities Survey said they would...

Last updated: Aug 7, 2013   4:55 PM GMT  |  Blog: Cloud Provider Commentary
Convert FTP to Secure FTP (submit file to JES on mainframe)

Answer  I have been informed that ETS (mainframe adminstrators) hss dictated that all ftp processes flowing into and out from the state's mainframe shall be secured as of a certain date in the future. Non-secured FTP will be denied (using port 23) at a certain date. Does anyone know of a secure ftp client ...

Last updated: May 19, 2008   5:27 PM GMT   |    FTP, Mainframe, SFTP
Ten steps to avoid being one of the73% of WordPress sites vulnerable to attack

Blog  According to this nakedsecurity blog post, "A recent investigation has concluded that 73% of the 40,000 most popular websites that use WordPress software are vulnerable to attack." Vulnerability researchers EnableSecurity carried out the study and was reported by WordPress security firm WP WhiteSecu...

Last updated: Sep 28, 2013   10:26 PM GMT  |  Blog: Security Corner
Future security architecture

Blog   Last week I was fortunate to catch an excellent presentation at GC 2008 by Martin Sadler, Director of HP Labs' Systems Security Lab, on the future of security and identity management.   If you haven't been tracking this topic then I suggest you check it out. For several years HP and othe...

Last updated: Jun 16, 2008   4:00 PM GMT  |  Blog: David Laceys IT Security Blog   |      architecture, Security Solutions, Technology
Symantec announces beefed up DeepSight service, new authentication capabilities

Blog   Move is part of an industry trend that turns threat intelligence data into actionable information. Symantec is bolstering its DeepSight service and integrating its VeriSign acquisition. The company recently announced its new Intelligent Authentication platform, which addresses secure access to w...

Last updated: Oct 18, 2011   1:49 PM GMT  |  Blog: Security Bytes
Spear Phishing For SugarCRM Customer Lists

Blog   I recently found a security vulnerability in SugarCRM which affects all versions prior to 5.5.0a and 5.2.0l. The vulnerability consists of a stored cross-site scripting vulnerability within the Documents section of the application. Full documentation of the exploit can be found at: http://jer...

Last updated: Mar 10, 2010   6:13 PM GMT  |  Blog: Harmonizing Regulatory Compliance and Risk Management
Is Windows hosting a better platform compared to Linux?

Answer  I'm setting up a website and I'm uncertain of what platform should I have for my server. My friends say having linux is much better compared to windows, but I'm more comfortable working with windows. when it comes to application specific to OS and security, which do you think is best? forgive me cau...

Last updated: Aug 24, 2011   9:53 AM GMT   |    Linux, Linux hosting, Linux servers
OBJECTIVE comparison (with independant references) between MS SQL and Oracle 10g

Answer  Morning all, I'm looking for links or actual documents comparing these two RDBMS's that do a good job of keeping their points "personal preferance bias-free". Gartner often is expensive and was hoping for other avenues of comparison. The focus I'm looking towards are comaprisons between: manageabi...

Last updated: Sep 1, 2004   10:28 AM GMT   |    Oracle, SQL Server
Featured IT Blog: Microsoft Enterprise Networking Team blog

Blog  Need to know how to migrate a DHCP database from Windows 2000 Server to Windows Server 2008 or Windows Server 2008 R2? How about some more information on a Microsoft security release? The Microsoft Enterprise Networking Team blog is chock-full of applicable information, including recent KnowledgeBas...

Last updated: Nov 12, 2009   5:39 PM GMT  |  Blog: ITKE Community Blog
Securing RPG, CL Sources Codes

Answer  Hi !I need to secure the RPG, CL program source codes with a Token or Permission or Hidden mode or Any keys from other power users to edit or view. What are the possible ways to achieve this. Infact these codes are used in an application and I need to protect this anyone. Even the QSECOFR should not...

Last updated: May 8, 2019   4:19 PM GMT   |    AS/400, RPGLE
Defeating Attacks Easier Than Detecting Them

Blog  This guest post comes to us from Lori MacVittie. Defeating modern attackseven distributed onesisn't the problem. The problem is detecting them in the first place. Last week, researchers claimed they discovered a way to exploit a basic security flaw that's used in software that's in high use ...

Last updated: Jul 20, 2010   7:22 PM GMT  |  Blog: Infrastructure 2.0 Blog   |      Data Center, Dynamic Infrastructure
Cast's Bonsignour: Managing software complexity with a microservices model

Blog  This is a guest post for the Computer Weekly Developer Network blog 'penned' byOlivier Bonsignour in his role as executive vice president of product development atCast--- the company is asoftware measurement and analysis solution provider focusing onsource code parsing, debugging, impact...

Last updated: Dec 8, 2016   10:39 AM GMT  |  Blog: CW Developer Network
PREV 1...10   20   30...41   42   43   44   45   46   47   48   49   50...   60   70   80...251 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: