Search Results | Application security
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...248 NEXT
Sort by:  Most Relevant  |  Date
Emerging Cloud Security Products

Blog  Question:What are some emerging cloud security products and approaches that assuage IT and Business executive concerns? New technologies require new approaches; the cloud is a new technology that has already had a profound effect on IT service delivery. As I discussed in a previous blog on the ...

Last updated: Oct 17, 2011   4:00 PM GMT  |  Blog: Ask the IT Consultant
Microsoft Patch Tuesday - 12th October 2010

Blog   Application Compatibility Update With this Microsoft Patch Tuesday update, we see the largest collection of updates ever delivered by Microsoft in a single Patch Tuesday release. In total, there are 16 updates with the following rating; 2 Critical, 12 Important and 2 Moderate. Aside from the sig...

Last updated: Oct 13, 2010   8:59 AM GMT  |  Blog: Cliff Saran’s Enterprise blog   |      Application Compatibility, Applications, ChangeBase
SOA security lesson

Blog  In a recent survey, our readers reported security is the top organizational requirement for SOA. All of the agility in the world doesn't matter if you can't provide it in a secure fashion. Yet traditional security isn't sufficient to lock down a services infrastructure. Applications aren't being ho...

Last updated: Dec 17, 2007   4:56 PM GMT  |  Blog: Microservices Matters
Avi Networks: Stop flying blind into a wall of knobs

Blog  Load balancing and application services used to rely ontraditional (i.e. old fashioned) appliance-based web application firewalls. That day has now passed, according to Avi Networks... a firm known for its so-calledIntelligent Web Application Firewall (iWAF) technology. Where [software] applia...

Last updated: Oct 10, 2017   10:27 AM GMT  |  Blog: CW Developer Network
The Center for Internet Security defines security metrics

Blog  As an information security manager I am always struggling with how to measure the security posture of my organization. As they say, you can't manage what you can't measure. There's lots of talk out there about ROI (Return on Investment) or ROSI (Return on Security Investment). These may be business ...

Last updated: May 22, 2009   3:24 PM GMT  |  Blog: IT Trenches
Security Testing Steps For Testing Team Of An Organization

Blog  Security Testing is not a new phenomenon but its depth is compellingly increasing due to avoid security flaws in an app that becomes an invitation for hackers. If we follow proper security testing steps everything can be taken care of to a larger extent. In fact, it is essential to understand these ...

Last updated: Sep 30, 2017   9:19 AM GMT  |  Blog: Quality Assurance and Project Management   |      Application security, code security
Top four considerations when securing the multi-cloud environment

Blog  This is a guest post byStephen Dane, managing director for cyber security at Cisco Asia-Pacific, Japan and Greater China We live in a multi-cloud world. A world where a multitude of offerings from cloud service providers (CSPs) gives us the potential to respond to business opportunities and chall...

Last updated: Aug 22, 2019   7:28 AM GMT  |  Blog: Eyes on APAC
Google Android Trojan surfaces in China

Blog  Users of Android smartphones in China could be infected by Geinimi malware if mobile applications are downloaded from third-party services. Security researchers at mobile security firm Lookout Inc. have discovered a new Trojan designed to compromise smartphones running Googles Android operating ...

Last updated: Jan 3, 2011   2:33 PM GMT  |  Blog: Security Bytes
An Introduction Cisco ASA FirePOWER Services

Blog  As we all know Cisco jumped into Next Generation Firewall segment, though they are late yet they are trying sell their next-generation firewall services, including Next-Generation Intrusion Prevention System (NGIPS), Application Visibility and Control (AVC), URL filtering, and Advanced Malware Prote...

Last updated: Aug 14, 2016   7:48 AM GMT  |  Blog: Network technologies and trends   |      CCIE, Cisco, Decryption
Web application security by the numbers

Blog  The security industry, like most of the IT world at large, is awash in statistics. Some reports are straightforward and easy to interpret, while others leave a lot to the imagination. The Web Application Security Consortium Security Statistics report falls into the latter category. On the face of i...

Last updated: Apr 11, 2007   2:10 PM GMT  |  Blog: Security Bytes
Oracle GraalVM Ent is a multilingual virtual machine

Blog  Oracle recently came to the dinner table with its Oracle GraalVM Enterprise Edition, so what it, why is important to developers and does Larry Ellison still have a beard? Built on Java SE, GraalVM Enterprise is a multilingual virtual machine for use in cloud and hybrid environments. This low footp...

Last updated: May 15, 2019   4:36 PM GMT  |  Blog: Open Source Insider
Too many vulnerability analysis tools spoils the broth

Blog  The problem with IT security and vulnerability analysis in complex enterprise application environments is (it is argued) that companies are prone to using almost too many protection tools. This scenario could in fact lead to a situation where security officers and development managers have trouble ...

Last updated: Sep 18, 2012   1:58 PM GMT  |  Blog: Open Source Insider   |      Uncategorized
SAP’s unexpected infrastructure investment

Blog  SAP Ventures is one of the companies that has invested $15 million in Imprivata, an identity and access management technology company that offers both hardware and software. SAP Ventures was particularly impressed by Imprivata's ability to "address compliance and insider security threats," explained...

Last updated: Apr 7, 2008   3:04 PM GMT  |  Blog: SAP Watch
When cloud application security gets nasty: multi-vectored DDoS

Blog  With cloud computing application security still something of a moot point, a number of vendors are now attempting to align new and existing offerings to address the risk of security breaches in the virtual cloud domain. Akamai is one such protagonist and the firm's Kona Site Defender has been launc...

Last updated: Feb 27, 2012   1:14 PM GMT  |  Blog: CW Developer Network   |      Uncategorized
Infosec 2011: application (development) appetisers Part I

Blog   For the average attendee, London's Infosecurity Europe (Infosec) event this week represents a chance to review the great and the good of the security industry's latest vendor offerings. For myself, I will be aiming to uncover some of the trends that come out from this event from a software applica...

Last updated: Apr 19, 2011   11:36 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Auditing Systems and Infrastructure Life Cycle Management - Part III

Blog  Categorically, Application-based pre-acquisition audits assess a system prior to obtaining usage rights considering such matters as: software requirements, vendor bidding, and system selection. Specifically, pre-acquisition assurance service coverage includes effects on IT resources, cost, an...

Last updated: Dec 23, 2011   8:48 PM GMT  |  Blog: IT Governance, Risk, and Compliance
holistic security

Blog  Holistic security is an approach that seeks to integrate all the elements designed to safeguard an organization, considering them as a complex and interconnected system. The ultimate purpose of holistic security is continuous protection across all attack surfaces: the totality of all physical, softw...

Last updated: Mar 20, 2017   8:17 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com   |      Attack surface, iot security, Network security
Blue Coat clads Cloud Controller with WAN optimization capabilities

Blog  Secure cloud services no longer need to perpetuate the stereotypeof slowness,now that Blue Coat Systems has added its Cloud-Connectorto its MACH5WAN optimization appliances -- both physical and virtual. Adding WAN optimization techniques (like protocol acceleration, compression, object and ...

Last updated: Nov 23, 2011   3:44 PM GMT  |  Blog: Window on WANs
Cloud Security Books and Recommended Reading

Blog  As Abraham Lincoln once said, "A capacity and taste for reading gives access to whatever has already been discovered by others." In the realm of cloud computing security, there is no more valuable information than the hard-earned lessons of those that have come and adopted before you. Don't make the...

Last updated: Feb 10, 2011   7:14 PM GMT  |  Blog: Enterprise IT Watch Blog
Databases are the New Target

Blog  I was interested to read about the latest assault on Oracle security by database security expert David Litchfield of NGSS. It comes as no surprise to me, as the focus of attacks and security controls are progressively and inevitably migrating from the infrastructure layer to the application space. D...

Last updated: Dec 3, 2006   2:19 PM GMT  |  Blog: David Laceys IT Security Blog   |      Technology, threats
PREV 1   2   3   4   5   6   7   8   9   10...   20   30   40   50   60   70...248 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: