Search Results | Application security
PREV 1...2   3   4   5   6   7   8   9   10   11...   20   30   40   50   60   70...249 NEXT
Sort by:  Most Relevant  |  Date
OWASP Top 10 Web Application Security Risks for 2010

Blog   The Open Web Application Security Project (OWASP) released the Top 10 Web Application Security Risks for 2010. The OWASP Top 10 has changed in the following ways since the last update of 2007. Added Security Misconfiguration Unvalidated Redirects and Forwards Removed Malicious F...

Last updated: Apr 20, 2010   10:02 PM GMT  |  Blog: Harmonizing Regulatory Compliance and Risk Management
Want to Eliminate Data Breaches? Time to Deploy A Zero Trust Architecture

Blog  It is no secret that perimeter security is one of the greatest challenges facing todays security and network admins. Conventional methods for connecting and protecting on-premises sites and/or multi-cloud environments, such as virtual private networks (VPNs), have proven to be ineffective. In add...

Last updated: Nov 5, 2018   4:07 PM GMT  |  Blog: Quality Assurance and Project Management   |      architecture, data breaches, DH2i
Video: code quality

Blog   Matt Peachey, vice president, Emea, Veracode - says eight out of 10 applications will be insecure. In this video he discusses why developers do not relate security to code quality. Peachey believes it is not just in-house code that may be not trust suppliers. "You need to hold supplie...

Last updated: Jan 3, 2012   3:29 PM GMT  |  Blog: Cliff Saran’s Enterprise blog   |      Android, Application security, quality
Trans-border Communication Protection - Part II

Blog  SSL is a protocol suite enabling in transit security through data encryption, server authentication, and message integrity at four Open Systems Interconnection (OSI) reference model layers. For Internet communications, SSL is normally utilized in conjunction with an entity's public key infrastructur...

Last updated: Jun 29, 2009   6:52 PM GMT  |  Blog: IT Governance, Risk, and Compliance
App users in developing APAC prefer convenience over security

Blog  By Kimberly Chua Mobile app users in developing Asia-Pacific (APAC) countries prefer convenience over security, signaling a potential rift between companies and users, a new F5 Networks study has found. The study revealed that while mobile app adoption in developing APAC countries is growing, only...

Last updated: Jul 27, 2018   0:24 AM GMT  |  Blog: Eyes on APAC
Enforcing embedded security for Android on the inside

Blog  Android-based embedded systems get a security lock down this month in the form of the newly released McAfee Application Control for Android. This security product resides inside the Android kernel, embedded in the operating system -- on the inside. The firm contends that it is the only security te...

Last updated: Mar 18, 2013   5:15 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Veracode slaps flaw flagger into developer toolchain

Blog  Software application development focused security and code quality firm Veracode has named its latest product offering Greenlight. The product aims to promote security higher up in the software development lifecycle. Saying that the short and cyclical nature of DevOps and continuous CI/CD dev...

Last updated: Jan 30, 2017   7:26 AM GMT  |  Blog: CW Developer Network
How secure are your mobile and embedded applications?

Blog  A wide array of security tools are available to handle threats that are prevalent over the desktop and server-centriccode runningin untrusted environments.But what about the newer mobile devices? Applications are being downloaded by the billions by consumers and these applications may be at ri...

Last updated: Jan 20, 2011   10:51 PM GMT  |  Blog: Software Quality Insights
What is information security management?

Answer  What's the definition of information security management and its application to corporate security?

Last updated: Nov 25, 2014   12:51 AM GMT   |    Information security
RHEL 5.6 boasts new bug and security fixes

Blog  Though Red Hat Enterprise Linux (RHEL) 6 may have just been released in November, RHEL 5 still has a lot left in the tank: Red Hat just announced version 5.6 of the platform with a host of new bug and security fixes. Overall fixes in RHEL 5.6 number approximately 2,000, and there are 340 individual ...

Last updated: Jan 18, 2011   1:56 AM GMT  |  Blog: Enterprise Linux Log
Moki CEO: developers should prioritise security

Blog  With the Gartner Security & Risk Management Summit kicking off today in London, UK -- the Computer Weekly Developer Blog figured that this would be the right time to feature guest commentary from Tom Karren, former developer and CEO of Moki, a mobile application security company. Why prioritise...

Last updated: Sep 8, 2014   2:22 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Citrix releases new application/XML acceleration appliances

Blog  The XML appliance market has been sluggish since around 2005, but some say advanced messaging protocols and the rise of cloud computing may bring these devices back to the forefront. Over the past decade, XML appliances have gone from hardware-based XML acceleration and security to full-blown B2B in...

Last updated: Mar 12, 2010   10:22 PM GMT  |  Blog: Microservices Matters
Don't lay all the blame for insecure systems on the developers

Blog  It's good to see the subject of secure development, and in particular the most serious coding issues that crop up within websites, making the mainstream news. See Dangerous coding errors revealed at It's a good and comprehensive list, although by no...

Last updated: Jan 14, 2009   9:00 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Security management, Web product security
Are your cloud apps' APIs secure?

Blog  It's a good question to ask. You think your API calls are secure. But, how do you know? It's likely you probably don't. The woeful case of the all-electric Nissan Leaf car has been beaten to a pulp recently by the tech news industry. It turns out the car can be accessed via an insecure API. Battery...

Last updated: Feb 29, 2016   2:23 PM GMT  |  Blog: Head in the Clouds: SaaS, PaaS, and Cloud Strategy   |      API, API Testing, Application security exec simplifies cloud security with Okta

Blog  Despite the progress SaaS has made in the enterprise, security concerns remain a hindrance to the growth of the market. Enter former executive, Tod McKinnon, now CEO of Okta, with a lofty goal: To accelerate enterprise adoption of cloud and web-based apps. All the ROI in the world do...

Last updated: Feb 2, 2011   8:59 PM GMT  |  Blog: Enterprise IT Watch Blog
Chef Automate forapplication automation incloud-native container-first

Blog  Open sourceContinuous Automation firm Chef has used itsChefConf 2017event toannounce new capabilities focused on thetransition process to cloud-native and container-first environments with consistent automation and DevOps practices. As we now discuss automation in the context of its benefi...

Last updated: May 23, 2017   8:52 AM GMT  |  Blog: Open Source Insider
Reports reveal realities, struggles behind cloud adoption

Blog  Twenty-one percent of respondents to a survey by Gigaom Research said they use the cloud to develop enterprise applications. The technology research company recently published the results of three different surveys in a report by analyst George Crump called, "Shadow IT: data protection and cloud sec...

Last updated: Nov 25, 2014   9:10 PM GMT  |  Blog: Head in the Clouds: SaaS, PaaS, and Cloud Strategy   |      Cloud adoption, Cloud Applications
It's time to tackle IoT security

Blog  The forecasts for IoT are huge, with some pundits suggesting that there will be 50 billion devices connected by 2020. Whether or not these forecasts are correct, it is clear IoT is already gaining meaningful market momentum, buoyed by a seemingly endless array of applications for consumers enterpris...

Last updated: Feb 16, 2016   10:04 PM GMT  |  Blog: IoT Agenda   |      Internet of Things, iot, iot security
Software security is everyone's problem

Blog  Good news about Web security is much rarer than it should be. There was some encouraging news recently, however. A report from WhiteHat Security found that over the course of a year, 66% of known vulnerabilities were corrected. When one considers how terrifying security reports usually are, happy su...

Last updated: Sep 19, 2008   2:26 PM GMT  |  Blog: Software Quality Insights   |      SMTP
Application Security - Three Levels of Security Testing

Blog  Application Security is a major concern inviting a series of multichannel risks. Application security is a major concern that needs to be addressed in a systematic and disciplined manner. There has to be a defined process to do so. It can never be done on an ad-hoc basis. With increasing trends of ...

Last updated: Feb 28, 2016   5:01 AM GMT  |  Blog: Quality Assurance and Project Management   |      Application security, Security testing
PREV 1...2   3   4   5   6   7   8   9   10   11...   20   30   40   50   60   70...249 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: