Search Results | Application security
PREV 1...10   20   30...46   47   48   49   50   51   52   53   54   55...   60   70   80...249 NEXT
Sort by:  Most Relevant  |  Date
Carry on Doctor, Your Electronic Patient Records Are Secure

Blog   The debate over whether Electronic Patient Records (EPRs) are a positive step towards improving patient care or a glaring security risk seems to be hinged on the security of back end data management. Healthcare data storage expert and CEO of BridgeHead Software Tony Cotterill has called secure d...

Last updated: Aug 11, 2010   8:48 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
VMware and the 40-foot ISO shipping container

Blog  VMware, Trend Micro and F5 Networks all gathered around one oblong-shaped roundtable late last week to discuss the state of the cloud, the future for the virtualised corporate network and the importance of 40-foot ISO shipping containers. VMware's chief cloud strategist Joe Baguley escorted the att...

Last updated: Oct 5, 2011   7:09 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Geek Speak: Password Stuff

Blog  Since I often discuss password related subjects, I thought it might be a good idea to "define my terms" for everyone. Here are ten password related definitions for your reading pleasure. Authentication: Determining whether someone or something is who or what it is declared to be. Is that really "mo...

Last updated: Apr 20, 2011   10:50 PM GMT  |  Blog: Security Corner
ECM software aims to balance ease of use and security

Blog  When it comes to enterprise file sharing, organizations are coming to recognize they need something that's both user friendly and secure. In this ECM Spotlight podcast, content management expert Ron Miller discusses how enterprise content management systems have matured to where it's easier to bala...

Last updated: Sep 11, 2015   7:51 PM GMT  |  Blog: The ECM spotlight   |      ECM, file sharing, Shadow IT
System i security: Look in the mirror

Blog  The PowerTech Group has released another study looking at System i security, and has found yet again that it's the people administering the systems that tend to cause security leaks, and not weaknesses in the hardware itself. According to the story, findings from the study include: 76 percent of s...

Last updated: Apr 4, 2007   12:01 AM GMT  |  Blog: The iSeries Blog
Auditing IT Service Delivery and Support - Part IV

Blog  Entities may partially or fully delegate some or all of its IT delivery and support activities to a Third Party Provider (TPP). IT activities that may be outsourced include IT functions such as, data center operations, IT security, and application maintenance. Usually, the responsibility for confi...

Last updated: Jan 24, 2012   8:34 PM GMT  |  Blog: IT Governance, Risk, and Compliance
Black Duck's open (source) truth: 'when good containers go bad'

Blog  This is a guest post for the Computer Weekly Open Source Insider column written byTim Mackeyin his capacity as technology evangelist for open sourceapplications and container management & security firmBlack Duck Software. As detailed on Computer Weekly here, containers encapsulate discr...

Last updated: Nov 2, 2017   12:16 AM GMT  |  Blog: Open Source Insider
AWS cloud features offer network, performance improvements

Blog  As is often the case, AWS' yearly Summit in New York provided the scene for some additional features and functionality. While AWS cloud features are unveiled regularly, the free-to-attend conference generates some excitement among both cloud newcomers and experienced shops alike. atte...

Last updated: Aug 3, 2018   3:29 PM GMT  |  Blog: AWS Cloud Cover
Could cloud be the gateway to innovation for financial services firms?

Blog  In this guest post, Ashish Gupta, BT's UK president of corporate and global banking financial markets, shares his views on how the banking sector should go about embracing cloud. The need to scale - add more customers, trade new asset classes, expand locations - at speed has overcome the financial s...

Last updated: Feb 24, 2016   3:08 PM GMT  |  Blog: Ahead in the Clouds   |      Cloud Computing, Cloud Security, Guest Post
Looking for a career in cloud security

Answer  Hi, I have been working in IT since 10 years now. This consists working experience as a hardware engineer, system administrator, application support, data center operations, virtualization, ITIL processes (Incident,problem and change management). As on certification part I have a VMware certificat...

Last updated: Sep 12, 2016   12:38 AM GMT   |    Cloud Computing, Cloud Security, ITIL
McAfee launches Security Innovation Alliance

Blog  There's some news today that'll be of interest to McAfee users: The company has just launched a new program for tech companies that want to integrate with McAfee ePolicy Orchestrator. The McAfee Security Innovation Alliance will "provide a set of tools designed to help integrate third-party applic...

Last updated: Sep 17, 2007   3:59 PM GMT  |  Blog: Security Bytes
SonicWall has introduced Deep Packet Inspection for SSL (DPI-SSL) traffic as part of its latest SonicOS release.

Blog   SonicWall adds Deep Packet Inspection for SSL traffic in its latest SonicOS 5.6 release. Whenever you upgrade your SonicWall firewall with the latest SonicOS 5.6 OS it will help counter the growing risk from encrypted threats, and from legitimate encrypted applications which may bypass content filt...

Last updated: Feb 23, 2010   11:24 AM GMT  |  Blog: Network technologies and trends
Are you a Know-IT-All? phishing kit

Blog  Our Tech Term is phishing kit A phishing kit is a do-it-yourself collection of tools that makes it easy for someone who lacks technical skills to launch a phishing exploit. The kit contains all the graphics, Web code, text and instructions the average person needs to put up a malicious w...

Last updated: Feb 5, 2009   7:31 PM GMT  |  Blog: Tech Quiz of the Day
Facetime Adds Sophos AV Protection to Unified Security Gateway

Blog  Facetime is a respected name in unified communications security. Its Unified Security Gateway, or USG 3.0, appliance allows enterprise administrators to control the web sites and applications that can be accessed by users, as well as monitoring and filtering content for Web 2.0 communications such a...

Last updated: Oct 30, 2009   12:32 AM GMT  |  Blog: Unified Communications: Click to talk
Software for Secure Computing: Firefox & NoScript

Blog  Everyone agrees that it just isn't safe out there on the Wild, Wild, Web and while Microsoft has made huge strides in securing Internet Explorer, the fact that IE continues to use ActiveX scripting technology makes it the least secure browser. I often recommend that people not use IE unless they hav...

Last updated: Oct 27, 2008   9:29 PM GMT  |  Blog: Security Corner
Head in the Clouds Computing

Blog   The Centre for the Protection of National Infrastructure (CPNI) has just published a briefing note on Cloud Computing, compiled by Deloitte. It's a useful snapshot of the latest fashions and jargon on this fast moving subject. Unfortunately, it fails to connect with reality when it comes to the sec...

Last updated: Mar 23, 2010   10:20 AM GMT  |  Blog: David Laceys IT Security Blog   |      Governance, risks, Technology
August Patch Tuesday - a busy time for the deployment team

Blog   Within the next 24 hours we'll get to see the latest security patch update from Microsoft. Those who find these notifications of use will already know that this month, August, is going to be a big one. Looking at the list of 14 security patches that are due to be released tomorrow, ther...

Last updated: Aug 9, 2010   1:53 PM GMT  |  Blog: Cliff Saran’s Enterprise blog   |      Application Compatibility, Applications, ChangeBase
DevopsGrader -- grades DevOps, not DevOps spin

Blog  There's way too much PR spin in DevOps, it's a basic fact of life. This week saw yet another example of a company (this time a security specialist) pitching for interviews with its DevOps security guru. Next they'll start calling it, DevSecOps, just wait. NOTE: Even if that term were popularise...

Last updated: Oct 1, 2015   8:52 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Good PC Security Begins With a Baseline

Blog  I received some good feedback on my 14 Golden Rules of Computer Security list, in particular, this comment from Michael: you encourage people to go through all the effort of running Virtual Machines to protect themselves from malware, but you dont actually encourage them to run Anti-V...

Last updated: Sep 5, 2009   3:03 PM GMT  |  Blog: Security Corner
Why your IoT solution needs an application enablement platform (AEP)

Blog  IoT solutions are comprised of lots of technology components including hardware devices, connectivity, middleware and application layers. At its core, an IoT solution like fleet management, remote asset tracking, smart electric meters or smart buildings facilitates the delivery of IoT data to applic...

Last updated: Sep 7, 2016   4:53 PM GMT  |  Blog: IoT Agenda   |      IIoT, Internet of Things, iot
PREV 1...10   20   30...46   47   48   49   50   51   52   53   54   55...   60   70   80...249 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: