Search Results | Application security
PREV 1...10   20   30...42   43   44   45   46   47   48   49   50   51...   60   70   80...252 NEXT
Sort by:  Most Relevant  |  Date
Defeating Attacks Easier Than Detecting Them

Blog  This guest post comes to us from Lori MacVittie. Defeating modern attackseven distributed onesisn't the problem. The problem is detecting them in the first place. Last week, researchers claimed they discovered a way to exploit a basic security flaw that's used in software that's in high use ...

Last updated: Jul 20, 2010   7:22 PM GMT  |  Blog: Infrastructure 2.0 Blog   |      Data Center, Dynamic Infrastructure
Cast's Bonsignour: Managing software complexity with a microservices model

Blog  This is a guest post for the Computer Weekly Developer Network blog 'penned' byOlivier Bonsignour in his role as executive vice president of product development atCast--- the company is asoftware measurement and analysis solution provider focusing onsource code parsing, debugging, impact...

Last updated: Dec 8, 2016   10:39 AM GMT  |  Blog: CW Developer Network
Cloud security standards commissioned from the NIST by America's CIO

Blog  In an effort to increase government adoption of cloud computing, America's CIO Vivek Kundra commissioned the National Institute of Standards and Technology (NIST) to create the Guidelines on Security and Privacy in Public Cloud Computing. If the guidelines provide even a working definition of cloud ...

Last updated: Feb 8, 2011   4:25 AM GMT  |  Blog: Enterprise IT Watch Blog
The Bourne Identity: A CISO sheds light on risk management mind-set

Blog  Bonk CISO Larry Whiteside on the head, and like Jason Bourne he will wake up thinking about security in 12 different languages. For me, security and risk management is a mind-set. When I go into a restaurant with my wife and kids, I automatically see where the exits are, says Whiteside. And h...

Last updated: Apr 10, 2009   2:39 PM GMT  |  Blog: TotalCIO   |      CIO
Riding the consumerization wave

Blog  By Cesare Garlati (@CesareGarlati) Rather than resist it, organizations should embrace Consumerization to unlock its business potential. This requires a strategic approach, flexible policies and appropriate security and management tools. The consumerization of IT is the single most influential tec...

Last updated: Nov 16, 2012   7:07 PM GMT  |  Blog: Enterprise IT Watch Blog
SOAP service authentication in Microsoft Silverlight

Answer  The SOAP Service is authenticated, whenever I'm trying to execute my SilverLight application, it shows the authentication window. I even tried the below method to pass the credentials but it does not work can anyone help with that, its making big issue. BasicHttpBinding AdminService_Binding = new Ba...

Last updated: Nov 24, 2014   7:04 AM GMT   |    Authentication, Microsoft Silverlight, SOAP
Is career change to information security adviseable?

Answer  Hi, I have done my bachelors in computer applications and PG diploma in cyber security back in INDIA. I am working for cognizant technologies but not in the profile of network admin or anything related to networks as i had to take a job whatever came my way to run family but i am very much intereste...

Last updated: Apr 7, 2011   1:37 PM GMT   |    Information security, Network administration, Network administrators
Edge Security - Why Is It Not Enough For Any Network?

Blog  Phil Trainor is a master in network security, inline security, network visibility, and network monitoring. In this post, he guides us why Edge Security is not enough. We have been talking to him on these topics in previous three posts. In the first post, we talk to him on the changing paradigm of ne...

Last updated: Aug 9, 2017   5:45 PM GMT  |  Blog: Quality Assurance and Project Management   |      Ixia, Network security
Cyber Security Strategy for Enterprises - Key Components

Blog  This is the last post of the series of interaction with Phil Trainor from Ixia. In this post, he will be talking about cyber security strategy. In the previous posts, we have covered Ixia's Solutions, Edge Security, Inline Security, importance of network monitoring, and Network Security Landscape. S...

Last updated: Aug 10, 2017   8:06 AM GMT  |  Blog: Quality Assurance and Project Management   |      Cyber security, Ixia
Overcoming security barriers in application development

Blog  This is a guest post for the Computer Weekly Developer Network by Jaime Ryan, director of product management & strategy at CA Technologies. Enforced trending Overwhelming market demands for mobile apps have forced software developers to streamline the development process while focusing on "...

Last updated: Feb 19, 2014   2:24 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Industrial IoT design insights: Five factors to consider

Blog  IoT is becoming ubiquitous in all types of product categories, from consumer goods and medical products to commercial and industrial systems. Industrial IoT applications bring about unique challenges. Issues that are minor annoyances or problems in consumer products can cause abject product system f...

Last updated: Apr 11, 2019   8:31 PM GMT  |  Blog: IoT Agenda   |      IIoT, IIoT design, IIoT platform
Integration using Direct Data Access

Blog  Integration using Direct Data Access Data Integration is where the applications integrate at the logical data layer by allowing the data in one application (the source) to be accessed by other applications (targets). In Data Integration, Direct Data Access involves directly accessing the source da...

Last updated: Dec 5, 2011   6:46 AM GMT  |  Blog: Enterprise IT Consultant Views on Technologies and Trends
Enabling RESTful Web Services in the Enterprise

Blog  Today's guest blog post byFrancois Lascelles tackles why RESTful web services matter in the enterprise, and why they're going to matter even more in the new future. Francois is the technical director of Europe for Layer 7 Technologies, and he also blogs at SYS-CON. -Michael As the old SOA p...

Last updated: Feb 17, 2010   6:28 PM GMT  |  Blog: Enterprise IT Watch Blog
Not just for cryptocash: How blockchain tech could help secure IoT

Blog  The internet of things isn't coming, it's already here. New healthcare, industrial, home and personal devices are being connected every day, right under our noses. Gartner predicts that by 2020, nearly 21 billion IoT devices will be online. Yet as exciting as this explosive growth may be, it also br...

Last updated: Feb 13, 2017   7:06 PM GMT  |  Blog: IoT Agenda   |      Blockchain, Internet of Things, iot
HTML5 apps that run like native for trading & finance

Blog  Financial markets and trading companies looking for an option to move towards implementation of HTML5 technologies for next-gen applications have a new avenue to explore. An alliance between "finance-grade" runtime technology company OpenFin and "web trading specialist" Caplin Systems has created a...

Last updated: Apr 23, 2013   9:33 AM GMT  |  Blog: CW Developer Network   |      Financial, HTML5
Log in an application as a user in windows

Answer  I am trying to log in an application that is installed on Windows 2003 server. This is what happens: I log in as an administrator in windows, I run the application, and I can log in the application (it requires log in information). If I log in as a user in windows, I run the application, I try to l...

Last updated: Dec 20, 2006   4:09 AM GMT   |    Microsoft Windows
Rx for integration pain

Blog  Jan Stafford, Executive Editor In a 2014 survey, readers of SearchCloudApplications and its sister sites identified application and data integration as the biggest challenges in software-as-a-service adoption. Industry researchers agree. Gartner analyst Eric Knipp calls app integration the No. 1 ba...

Last updated: Apr 23, 2015   2:15 PM GMT  |  Blog: Head in the Clouds: SaaS, PaaS, and Cloud Strategy   |      Application integration, Cloud integration, SaaS
All I Really Need to Know About Security I Learned From My Cat

Blog  Don't want to exclude the cat lovers out there. Besides, dogs aren't the only security experts. In fact, dogs could learn a lot from cats (OK, cats could learn a lot from dogs, too). Anyway, thanks to Dr. Andrew Jones, DVM, for the idea to write this and my previous post. He sent me an email entitl...

Last updated: Dec 31, 2010   10:00 PM GMT  |  Blog: Security Corner
The value of big data in security

Blog  One of today's buzzwords is big data. Volumes of information generated are increasing rapidly, driven in part by increased take up of mobile technologies and the growing number and range of machine-to-machine communications as ever more equipment such as industrial sensors is connected to networks. ...

Last updated: Dec 21, 2012   4:07 PM GMT  |  Blog: Bloor Security   |      Big Data, Log management, Security
What you need to know about robotic process automation security

Blog  Organizations now face a choice of over 45 claimed robotic process automation products -- all varying significantly in quality, design and approach. So, picking the right option is critical to achieving long-term success. However, with approximately 30% of all data breaches occurring as a result of ...

Last updated: Apr 17, 2019   4:16 PM GMT  |  Blog: IoT Agenda   |      connected RPA, connected workers, Digital transformation
PREV 1...10   20   30...42   43   44   45   46   47   48   49   50   51...   60   70   80...252 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: