Search Results | Application security
PREV 1...3   4   5   6   7   8   9   10   11   12...   20   30   40   50   60   70...248 NEXT
Sort by:  Most Relevant  |  Date
Application Security - Three Levels of Security Testing

Blog  Application Security is a major concern inviting a series of multichannel risks. Application security is a major concern that needs to be addressed in a systematic and disciplined manner. There has to be a defined process to do so. It can never be done on an ad-hoc basis. With increasing trends of ...

Last updated: Feb 28, 2016   5:01 AM GMT  |  Blog: Quality Assurance and Project Management   |      Application security, Security testing
Bringing application risk management to health care

Blog  ORLANDO, Fla. -- Given that the majority of health care data breaches occur at the application layer, health care organizations need to make application risk management a high priority. Doing so requires far more than simply investing in application security tools, according to John B. Sapp Jr., the...

Last updated: Feb 25, 2011   6:30 PM GMT  |  Blog: Health IT Pulse   |      Application security, HIMSS 2011, patient data security
Threat Monitor: Protecting exposed servers from Google hacks (and Google ‘dorks’)

Blog  Recently, a security professional asked our application security expert, Michael Cobb, "How are phishers using search engines like Google to seek out and hack vulnerable PHP applications? What can be done to protect those apps?" As part of his monthly responses to readers, Cobb explains how to keep...

Last updated: Jun 19, 2008   2:52 PM GMT  |  Blog: Security Wire Weekly
.NET application fails with my network hard drive

Answer  I've been having a ton of trouble with my .NET application. It continues to fail when I try to run my network drive (but when it runs from a local hard drive, it works fine). I tried fixing the full trust like this: try { // Demand full trust permissions PermissionSet fullTrust = new Permiss...

Last updated: Mar 26, 2014   4:00 PM GMT   |    .NET applications, Hard drives, Networking
Software for Secure Computing: Keep Your Software up to Date

Blog  Though you probably don't think of it as software, Microsoft Windows Update is a web-based application that's a vital part of your secure computing initiative. As recently as last month, I had to clean up a system that had been severely infected with malware. One of the steps in my cleanup process w...

Last updated: Aug 21, 2008   1:50 AM GMT  |  Blog: Security Corner
The three UC issues to address before you deploy

Blog  Before making the move to unified communications (UC), every organization must prioritize three issues: scalability, application integration and security. Failure to address these issues can have far-reaching implications for organizations when they enter a growth cycle or encounter a security threa...

Last updated: Jul 2, 2015   4:13 PM GMT  |  Blog: Unified Communications Nation   |      Big Data, cloud, service provider
Evolving options for securing IoT in the enterprise

Blog  In October 2016, my column discussed the impact of Moore's Law and Metcalfe's Law on the internet of things, basically stating that IoT is in your future because the Law says so. For decades now, Moore's Law has accurately predicted the steadily rising roadmap of new and more powerful devices, which...

Last updated: Dec 21, 2016   4:57 PM GMT  |  Blog: IoT Agenda   |      DDOS, Denial of Service, firewall
Six Questions to Ask A New Software Vendor

Blog  During the "sales romance," when software vendors are showing off the bells and whistles of their product to the ooohs and aahhhs of management, it's a challenge sometimes to be the "wet blanket" of security reality. All too often, executives make software purchases without any regard as to regulat...

Last updated: Feb 24, 2009   9:50 PM GMT  |  Blog: Sister CISA CISSP
Paying Attention To Statistics

Blog  We get a lot of information about what security issues are important from various sources on the Internet. Most of them we know about from one source or another. But here's one that jumped right out at me: According to the Privacy Rights Organization, of the top 10 data breaches in 2009, 93 percen...

Last updated: Apr 26, 2010   4:29 PM GMT  |  Blog: Sister CISA CISSP
Jasper-adhoc Report :java.lang.RuntimeException: exception getting dataset from cache

Answer  Hi, I am using Jasper Report in my application and started doing with adhoc reports. I created a topic and created somereports out of it. The problem is: When i run thesereport from Jasper UI , they run successfully but when i tries to run these adhoc reports from my application,the follo...

Last updated: Oct 7, 2010   11:45 AM GMT   |    Ad Hoc, Jasper, Jasper Reporting tool
Time to brush up on mobile development skills

Blog  As Hewlett-Packard preps its would-be Apple iPad killer -- the HP TouchPad -- for release on July 1, a new research report from ABI Research predicts that the market for enterprise smartphone and media tablet applications will reach 830 million just five years from now. The research firm says that ...

Last updated: Jun 20, 2011   10:01 PM GMT  |  Blog: Channel Marker
Security software for Linksys WAP

Answer  I'm trying to find a easy-to-use / configure security software application that I can use with my Linksys Wireless-G Access Point (Mfg. Part: WAP54G). I need an application that will allow me to control who has access to the wireless access point as well as what they can access. I have looked at Lu...

Last updated: Feb 4, 2005   4:37 PM GMT   |    802.11b, 802.11g, Data Management
BlackBerry Passport security

Answer  Hi this is Adam, recently due to security issues in Android and iPhone, I switched to BlackBerry and I purchased blackberry passport, My question is as BlackBerry passport supports version 10.3.2, can I install Android application through Android emulator, so does these mean even in BlackBerry my da...

Last updated: Jun 23, 2015   9:31 PM GMT   |    Android, BlackBerry, Mobile security
Database Security Webcast on January 19th, 2018

Blog  On January 19th meet with the crew from Denny Cherry and Associates Consulting at 11 am Pacific Time / 2 pm Eastern Time. During this webcast, we'll talk about database security in general and specifically how Spectre and Meltdown impact database workloads within the Enterprise. With Spectre and Me...

Last updated: Jan 8, 2018   4:00 PM GMT  |  Blog: SQL Server with Mr. Denny

Answer  We are using LDAP for Internal environment as an Enterprise directory having lot of application and user specific data. There is requirement to access LDAP from external network also. Bearing that in mind we shall have LDAP Server in DMZ to service external applications. Here we are using Sun Direct...

Last updated: Jun 24, 2005   6:44 PM GMT   |    Application security, Biometrics, Database
Mozilla announces flaw, fix in FireFox, SeaMonkey

Blog   Mozilla has announced that there is a flaw in both its FireFox browser and the SeaMonkey application suite that would allow attackers to bypass security using a regression error in the way the open-source apps handle IMG tags. The flaw affects Firefox version and, and SeaMonkey ver...

Last updated: Mar 6, 2007   10:21 PM GMT  |  Blog: Channel Marker
How to ratify & audit open source security

Blog  SpiderOak this month released its open-source cryptographically-secure cloud application development framework called Crypton. This is interesting, but that's not the point. The software is essentially a method for creating privacy-oriented applications that can use any backend storage provider. ...

Last updated: May 1, 2014   3:05 PM GMT  |  Blog: Open Source Insider   |      Uncategorized
Do you manage or develop websites and need to know more about securing them?

Blog  If you do manage websites, then you should know about the Open Web Application Security Project (OWASP). This group is working to make web application security issues visible so organizations can make intelligent decisions about how to address the risks. There is a great series of very short (5 min...

Last updated: Jul 20, 2009   7:22 PM GMT  |  Blog: IT Trenches
First-generation firewalls do not cut the mustard

Blog  In the wake of the InfoSec information security exhibition in London last month, I think I finally have Part II to my blog written to coincide with the event: Infosec 2011: application (development) appetisers Part I. What I was looking for was some insight into how the mechanics of security techno...

Last updated: May 11, 2011   9:54 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
links for 2008-04-12

Blog   EMC unveils new solution aimed at advancing IT and security operations Working to converge security and operations - The solution is based on EMC's Voyence Control product for Network Change and Configuration Management (NCCM) and the RSA enVision product for Security Information and Event Ma...

Last updated: Apr 12, 2008   4:38 PM GMT  |  Blog: Adventures in Data Center Automation   |      DataCenter
PREV 1...3   4   5   6   7   8   9   10   11   12...   20   30   40   50   60   70...248 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: