Search Results | Application security
PREV 1...20   30   40...56   57   58   59   60   61   62   63   64   65...   70   80   90...251 NEXT
Sort by:  Most Relevant  |  Date
Security and Mounting Threats Redux

Blog   I discovered an interesting article online: New Hacking Tools Pose Bigger Threats to Wi-Fi Users. The accompanying video from Hak5 is also quite interesting (provided for the hard-core tech types). If you read the article, and watch the first 5 or 10 minutes of the video, you quickly reali...

Last updated: Feb 20, 2011   10:12 PM GMT  |  Blog: The Business-Technology Weave
Are you ready to support Oracle on the iPhone?

Blog  That screaming you heard today? That was the sound of hundreds of IT professionals reacting to the Apple App Store created today for the new iPhone. A 3G version of the phone is being released this week and enterprise software vendors are beginning to take notice, giving credibility to the iPhone in...

Last updated: Jul 11, 2008   2:21 PM GMT  |  Blog: Eye on Oracle
Secunia Network Inspector

Blog  I've been working in some depth around Windows security topics since 1997, when I began teaching Windows hardening classes at Interop with my colleague and co-author James Michael Stewart. In 2003, I started researching malware topics and tools, a quest that eventually led to my 2005 book "Fighting ...

Last updated: Nov 26, 2008   5:22 PM GMT  |  Blog: Windows Enterprise Desktop
Five Emerging Trends Of Information Technology In 2015

Blog  A very interesting question I found on the forum asking what would be some of the emerging trends in information technology this year. Instantly following emerging trends popped up in my mind as listed below: 1. Cloud: Technology and cloud are bound to become synonyms soon. In fact, for some, it ...

Last updated: May 1, 2015   10:31 AM GMT  |  Blog: Quality Assurance and Project Management   |      Chief Compliance Officer, Chief Data Officer, CIO
Think You're Not a Target Because You're Small? Think Again

Blog  If you pay attention to mainstream media, you can easily get the wrong idea about online attacks. The press usually only covers the sensational data breaches like the recent Epsilon and Sony fiascoes. Truth is, there are far more people at risk than the press leads you to believe. Consider the case...

Last updated: Apr 30, 2011   10:37 PM GMT  |  Blog: Security Corner
Channel news: TSA loses PC with payroll data; lax security led to TJX crack

Blog  TSA loses hard drive with personal info The Transportation Security Administration has lost a computer hard drive containing Social Security numbers, bank data and payroll information for about 100,000 employees. Lax security led to TJX breach Security pros left windows open. [TheReg] Windows activ...

Last updated: May 7, 2007   11:56 AM GMT  |  Blog: Channel Marker
Becoming better with blockchain

Blog  Blockchain, best known for being the technology behind cryptocurrencies such as Bitcoin and Ethereum, has gained significant popularity over the last couple of years. Today, however, its value in other applications may be greater than the initial application which popularized the technology. Known ...

Last updated: Jun 15, 2018   4:34 PM GMT  |  Blog: IoT Agenda   |      Bitcoin, Blockchain, Blockchain Development
iPhone jailbreaking exploit sparks mobile security concerns

Blog  Jailbroken phones are more prone to security threats, researchers say. The emergence of an exploit used by a website for iPhone "jailbreaking" prompted security researchers to issue warnings about smartphone security. The website, Jailbreakme.com, allows iPhone and iPad users who visit the site ...

Last updated: Aug 4, 2010   4:25 PM GMT  |  Blog: Security Bytes
February in review: the top Windows Server news and content

Blog  In our monthly feature, we highlight the content that's been most popular with our readers and share it with you. For February, Windows Server admins were interested in new Microsoft CEO Satya Nadella, the latest Patch Tuesday updates and securing Windows Server. IT pros react to Satya Nadella as ...

Last updated: Mar 3, 2014   4:08 PM GMT  |  Blog: The Windows Server Notebook
Apple's security 10 years behind Microsoft's?

Blog  In light of the recent Flashback Trojan that infected an estimated 600,000 Mac users last month, industry experts are discussing Apple's security. The perception has always been that Apple's OS is more secure than Microsoft's. This was led by the misconception that Apple computers could not be infec...

Last updated: May 14, 2012   4:04 PM GMT  |  Blog: Security Corner
The Four D's of Cyber Security: Deny, Discriminate, Detect, & Destroy

Blog  This is an interesting and sensible approach to security. I would call these the "Logics of Cyber Security" because they're so basic they could well be the principles upon which all cyber security can be based. The paper's authors call them "first principles," defining such as "...a basic foundati...

Last updated: Oct 21, 2008   5:00 PM GMT  |  Blog: Security Corner
Database security: Top 10 database vulnerabilities list

Blog  New vulnerabilities list outlines the most common database problems that could lead to a costly data breach. Database administrators are all too familiar with the issues outlined in Application Security Inc.s new Top 10 database vulnerabilities list. From the use of default passwords to patchin...

Last updated: Jun 3, 2010   1:53 PM GMT  |  Blog: Security Bytes
Understanding Elastic Caching Plaftorms - IBM eXtreme Scale

Blog  Understanding Elastic Caching Plaftorms - IBM eXtreme Scale Data Caching is a standard technique used for improving application performance. Local caching, though the fastest, is not able to scale and caching multiple copies of the same data in local caches raises a complication of keeping the copie...

Last updated: Nov 15, 2010   8:23 AM GMT  |  Blog: Enterprise IT Consultant Views on Technologies and Trends
Inside IncludeOS - what is a unikernel?

Blog  IncludeOS is a unikernel, a special type of library operating system that allows developers to write and run their application in the cloud... in place, that is, of a more traditional OS. Unikernels are said to run without many of the heavy overheads of Unix-like OSs. CEO of IncludeOS Per Bu...

Last updated: Jul 31, 2018   10:58 AM GMT  |  Blog: CW Developer Network
Putting Activity Where It Belongs

Blog   When discussing Business and IT roles and responsibilities - the Who Does What, Why and When? -were trying to position activity according to efficiency: to the arena that is best suited to a particular action by virtue of knowledge, resource, and responsibility. This facilitat...

Last updated: Apr 30, 2010   11:30 AM GMT  |  Blog: The Business-Technology Weave
Can we hack our way out of a doomed Dark Web future?

Blog  Software application developers tasked with shoring up the buttresses of our national and corporate defences may have been disheartened by recent reports forecasting nothing but future doom for data security. The Gartner risk and security summit in London last month featured a range of speakers a...

Last updated: Oct 3, 2014   9:03 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Better security through better visualization

Blog  I'm always excited when I stumble across an area which is an intersection of two of my favorite topics. Recently, I started reading Applied Security Visualization by Raffael Marty. In the book, Marty introduces the concepts and techniques of network visualization and explains how you can use that in...

Last updated: Feb 26, 2009   1:58 PM GMT  |  Blog: Software Quality Insights
Converting Upsized MS Access/SQL database and application to ASP.net for the web

Answer  I have no experience wih ASP or web server based applications, but I have an Access program that I need to put on the web. What is the easiest route to full web implementation for a program that is currently using Access as the front end for a 200+GB db? The application needs to be secure. It con...

Last updated: Oct 17, 2004   5:46 PM GMT   |    ASP.NET, SQL
Cisco ASA-X - CX Module

Blog  Hi all, The ASA-X series has many benefits including higher throughput and an IPS that can be installed by simply adding a license key to the ASA-X series. But what about context based security? For example, lets say that you want to block FaceBook for people that use Macs (because you don...

Last updated: Mar 31, 2012   1:13 PM GMT  |  Blog: TechStop
ITKE Twitter security chat (February 25th)

Blog   Twitter image via Shutterstock It's almost the end of the month...do you know what that means? It's time for another #ITKESecurity Twitter chat! Our experts, including Kevin Beaver, Jeff Cutler and Ken Harthun will be returning on February 25th at 1 PM (EST). And what will be the big topic? This m...

Last updated: Feb 18, 2015   3:22 PM GMT  |  Blog: ITKE Community Blog   |      Disaster Recovery, ITKE, twitter
PREV 1...20   30   40...56   57   58   59   60   61   62   63   64   65...   70   80   90...251 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: