Search Results | Application security
PREV 1...10   20   30...46   47   48   49   50   51   52   53   54   55...   60   70   80...252 NEXT
Sort by:  Most Relevant  |  Date
ECM software aims to balance ease of use and security

Blog  When it comes to enterprise file sharing, organizations are coming to recognize they need something that's both user friendly and secure. In this ECM Spotlight podcast, content management expert Ron Miller discusses how enterprise content management systems have matured to where it's easier to bala...

Last updated: Sep 11, 2015   7:51 PM GMT  |  Blog: The ECM spotlight   |      ECM, file sharing, Shadow IT
System i security: Look in the mirror

Blog  The PowerTech Group has released another study looking at System i security, and has found yet again that it's the people administering the systems that tend to cause security leaks, and not weaknesses in the hardware itself. According to the story, findings from the study include: 76 percent of s...

Last updated: Apr 4, 2007   12:01 AM GMT  |  Blog: The iSeries Blog
Auditing IT Service Delivery and Support - Part IV

Blog  Entities may partially or fully delegate some or all of its IT delivery and support activities to a Third Party Provider (TPP). IT activities that may be outsourced include IT functions such as, data center operations, IT security, and application maintenance. Usually, the responsibility for confi...

Last updated: Jan 24, 2012   8:34 PM GMT  |  Blog: IT Governance, Risk, and Compliance
US military approves Genband communications kit

Blog  Genband has used its Orlando-located Perspectives16 user/customer/partner/developer event to announce news of US military graded approval for its communications technology. [caption id="attachment_824" align="alignright" width="300"] Bad news for bad guys: the US defense team is packing extra commu...

Last updated: May 4, 2016   10:52 AM GMT  |  Blog: CW Developer Network
In exit memo, Ozzie points Microsoft toward cloud: Is he right?

Blog  Tech guru Ray Ozzie is leaving Microsoft, and in the wake of the announcement, a memo from Ozzie was leaked to the media. In the memo, Ozzie asks Microsoft to confront an age without PCs, an age in which Microsoft's traditional PC incumbency would be meaningless. What Ozzie is looking at is whether...

Last updated: Oct 26, 2010   12:55 AM GMT  |  Blog: Uncommon Wisdom
A bug fix always beats a round of risk assessments

Blog  When static code analysis tools identify a bug in the production code, there are two approaches organizations can take. The sensible one is to put a software developer or two on the problem and implement an immediate bug fix. The other option is to assemble the software team, debate the relative ris...

Last updated: Sep 26, 2017   8:05 PM GMT  |  Blog: Coffee Talk: Java, News, Stories and Opinions
Pentaho aims to alleviate big data pains

Blog  Seemingly retaining its original name, technology stack and altogether vibe-ness with competancy over a year now since being acquired by Hitachi Data Systems, Pentaho is putting out the data developer/analyst messages and tuning up its own integration prowess in the process. The data integrat...

Last updated: Sep 27, 2016   12:47 AM GMT  |  Blog: Open Source Insider
Looking for a career in cloud security

Answer  Hi, I have been working in IT since 10 years now. This consists working experience as a hardware engineer, system administrator, application support, data center operations, virtualization, ITIL processes (Incident,problem and change management). As on certification part I have a VMware certificat...

Last updated: Sep 12, 2016   12:38 AM GMT   |    Cloud Computing, Cloud Security, ITIL
SonicWall has introduced Deep Packet Inspection for SSL (DPI-SSL) traffic as part of its latest SonicOS release.

Blog   SonicWall adds Deep Packet Inspection for SSL traffic in its latest SonicOS 5.6 release. Whenever you upgrade your SonicWall firewall with the latest SonicOS 5.6 OS it will help counter the growing risk from encrypted threats, and from legitimate encrypted applications which may bypass content filt...

Last updated: Feb 23, 2010   11:24 AM GMT  |  Blog: Network technologies and trends
McAfee launches Security Innovation Alliance

Blog  There's some news today that'll be of interest to McAfee users: The company has just launched a new program for tech companies that want to integrate with McAfee ePolicy Orchestrator. The McAfee Security Innovation Alliance will "provide a set of tools designed to help integrate third-party applic...

Last updated: Sep 17, 2007   3:59 PM GMT  |  Blog: Security Bytes
Are you a Know-IT-All? phishing kit

Blog  Our WhatIs.com Tech Term is phishing kit A phishing kit is a do-it-yourself collection of tools that makes it easy for someone who lacks technical skills to launch a phishing exploit. The kit contains all the graphics, Web code, text and instructions the average person needs to put up a malicious w...

Last updated: Feb 5, 2009   7:31 PM GMT  |  Blog: Tech Quiz of the Day
Software for Secure Computing: Firefox & NoScript

Blog  Everyone agrees that it just isn't safe out there on the Wild, Wild, Web and while Microsoft has made huge strides in securing Internet Explorer, the fact that IE continues to use ActiveX scripting technology makes it the least secure browser. I often recommend that people not use IE unless they hav...

Last updated: Oct 27, 2008   9:29 PM GMT  |  Blog: Security Corner
Facetime Adds Sophos AV Protection to Unified Security Gateway

Blog  Facetime is a respected name in unified communications security. Its Unified Security Gateway, or USG 3.0, appliance allows enterprise administrators to control the web sites and applications that can be accessed by users, as well as monitoring and filtering content for Web 2.0 communications such a...

Last updated: Oct 30, 2009   12:32 AM GMT  |  Blog: Unified Communications: Click to talk
Head in the Clouds Computing

Blog   The Centre for the Protection of National Infrastructure (CPNI) has just published a briefing note on Cloud Computing, compiled by Deloitte. It's a useful snapshot of the latest fashions and jargon on this fast moving subject. Unfortunately, it fails to connect with reality when it comes to the sec...

Last updated: Mar 23, 2010   10:20 AM GMT  |  Blog: David Laceys IT Security Blog   |      Governance, risks, Technology
August Patch Tuesday - a busy time for the deployment team

Blog   Within the next 24 hours we'll get to see the latest security patch update from Microsoft. Those who find these notifications of use will already know that this month, August, is going to be a big one. Looking at the list of 14 security patches that are due to be released tomorrow, ther...

Last updated: Aug 9, 2010   1:53 PM GMT  |  Blog: Cliff Saran’s Enterprise blog   |      Application Compatibility, Applications, ChangeBase
How Amazon Web Services protects your data

Blog  It's true that the number of data breaches are decreasing. But as CEO of CyberRiskPartners Drew Bartkiewicz pointed out, the number of records compromised per breach is increasing. This observation seems to be the contributing factor to what Infosecurity refers to as a product of our economy shiftin...

Last updated: Oct 22, 2010   2:26 PM GMT  |  Blog: Enterprise IT Watch Blog
Good PC Security Begins With a Baseline

Blog  I received some good feedback on my 14 Golden Rules of Computer Security list, in particular, this comment from Michael: you encourage people to go through all the effort of running Virtual Machines to protect themselves from malware, but you dont actually encourage them to run Anti-V...

Last updated: Sep 5, 2009   3:03 PM GMT  |  Blog: Security Corner
Carry on Doctor, Your Electronic Patient Records Are Secure

Blog   The debate over whether Electronic Patient Records (EPRs) are a positive step towards improving patient care or a glaring security risk seems to be hinged on the security of back end data management. Healthcare data storage expert and CEO of BridgeHead Software Tony Cotterill has called secure d...

Last updated: Aug 11, 2010   8:48 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
VMware and the 40-foot ISO shipping container

Blog  VMware, Trend Micro and F5 Networks all gathered around one oblong-shaped roundtable late last week to discuss the state of the cloud, the future for the virtualised corporate network and the importance of 40-foot ISO shipping containers. VMware's chief cloud strategist Joe Baguley escorted the att...

Last updated: Oct 5, 2011   7:09 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Geek Speak: Password Stuff

Blog  Since I often discuss password related subjects, I thought it might be a good idea to "define my terms" for everyone. Here are ten password related definitions for your reading pleasure. Authentication: Determining whether someone or something is who or what it is declared to be. Is that really "mo...

Last updated: Apr 20, 2011   10:50 PM GMT  |  Blog: Security Corner
PREV 1...10   20   30...46   47   48   49   50   51   52   53   54   55...   60   70   80...252 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: