Search Results | Application security
PREV 1...30   40   50...66   67   68   69   70   71   72   73   74   75...   80   90   100...251 NEXT
Sort by:  Most Relevant  |  Date
Taking An Innovative Approach To Cloud Management

Blog  As organizations start to think about using cloud computing for more of their applications and workloads, they are often coming across a series of common management challenges: How do we centralize governance and control of cloud deployments, particularly public clouds? How to we leverage our exi...

Last updated: Dec 17, 2013   9:02 PM GMT  |  Blog: Hybrid Cloud Trender   |      Hybrid Cloud, Hybrid Cloud Management
Blockchain for developers, where do we start?

Blog  The Computer Weekly Developer Network wants to know whats next for software engineers, that much you already know. In that regard then, we want to know how developer-programmers should be thinking about blockchain technologies in relation to the builds they are currently working on and the proje...

Last updated: Jan 3, 2018   7:14 PM GMT  |  Blog: CW Developer Network
Shrink Your Attack Surface

Blog  Ive heard this phrase bandied about in Linux forums and in the occasional blog post, but its something I never considered relative to the security of Windows boxes.  Theres an awful lot of research on the subject and it boils down to this: The larger the attack surface, the more insecu...

Last updated: Aug 7, 2009   6:50 PM GMT  |  Blog: Security Corner
SUSE serves up Linux kernel patching, live & hot

Blog  If theres one thing that Linux needs to aid its march onwards it is (arguably) more enterprise robustness. Actually, if theres one thing that Linux needs for enterprise success its firms like Microsoft stating that it loves Linux, but weve already experienced that epiphany, so what else...

Last updated: Feb 6, 2018   7:24 AM GMT  |  Blog: Open Source Insider
Questions to Ask Before Jumping on the Cloud

Blog   Thinking about the cloud but not quite sure what to do? You are not alone. Thousands of businesses across the land have been bombarded with advertising about the cloud, how it can save you money and how you wont be able to live without it. The truth is cloud computing is definitely worthy of con...

Last updated: Sep 29, 2011   1:45 PM GMT  |  Blog: Clouds Ahead
IT organization of the future is a hybrid

Blog  In 2021, cloud computing is simply computing, corporate office parks are senior housing facilities and the IT organization of the futurehas been absorbed by the business. Oh, and Apple has lost its proprietary hold on mobile application development -- in court, no less -- giving every company out...

Last updated: Jul 27, 2011   2:52 PM GMT  |  Blog: TotalCIO
Software development in the global interconnected sandbox

Blog  Perforce has upped its software version management system with a new release featuring additional capabilities for "advanced distributed version control" to keep developers productive even when they are disconnected from the firm's shared versioning service. New replication technology is also said ...

Last updated: Apr 24, 2012   3:43 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Windows 2008 Server Manager.

Blog  It took a while to get out of the habit of using Manage from right clicking on My Computer to manage my server. After all it has been embedded in my head over the last several years. Now with Windows 2008 we have a new application or console called Server Manager. Now you can use Server Manager to ...

Last updated: Jun 28, 2011   5:52 PM GMT  |  Blog: Karl's Windows Admin Tips & Tricks
Security Forensics with Niksun or CA or Sandstorm

Answer  Does any have experience recording and tracking traffic with playback using any of these venders. I am looking for the best solution to provide Forensics on my network. Niksun or CA or Sandstorm Also on a side not I am lookign for a product to do secure email delivery. Please let me know if ...

Last updated: Mar 1, 2005   9:28 AM GMT   |    Application security, Bandwidth, Database
TechTarget's weekly roundup (6/19 - 6/26)

Blog   Compliance image via FreeImages Is regulatory compliance among your organization's biggest IT priorities this year? Find out why it's at the top of the list for many professionals in this week's roundup. 1. IT Priorities 2017 survey: Compliance initiatives in full throttle - Ben Cole (SearchCompli...

Last updated: Jun 26, 2017   11:48 AM GMT  |  Blog: Enterprise IT Watch Blog   |      Compliance, cybersecurity, DevOps
TechTarget's weekly roundup (8/28 - 9/4)

Blog   Security image via FreeImages What do you think of the Intel Management Engine kill switch? Check out its connection to a certain NSA program in this week's roundup. 1. Intel kill switch code indicates connection to NSA - Michael Heller (SearchSecurity) Researchers discovered an Intel kill switch...

Last updated: Sep 5, 2017   11:36 AM GMT  |  Blog: Enterprise IT Watch Blog   |      Intel, salesforce, Security
TechTarget's weekly roundup (10/30 - 11/6)

Blog   Storage image via FreeImages What odds do you give Violin Systems of long-term survival? Learn why the CEO thinks that profits are on the way in this week's roundup. 1. Violin Systems CEO Abbasi says profits coming in 2018 - Dave Raffo (SearchStorage) All-flash pioneer Violin emerges from bankrup...

Last updated: Nov 6, 2017   1:49 PM GMT  |  Blog: Enterprise IT Watch Blog   |      Azure, GDPR, Machine learning
Microsoft hires Linux security guru Crispin Cowan

Blog  Microsoft has added yet another big name to is Windows Security team: Crispin Cowan. These hirings have become old hat at this point, but this one has an interesting twist in that Cowan is renowned as a Linux security expert. He is the brains behind the StackGuard compiler, which is designed to turn...

Last updated: Jan 22, 2008   2:19 PM GMT  |  Blog: Security Bytes
Video: Install and configure SNORT on an XP PC

Blog  In this video, the instructor goes through the process of downloading, installing and configuring Snort as a sniffer and an intrusion detection system on a Windows XP machine. [kml_flashembed movie="http://www.youtube.com/v/nAWN989WA0A" width="425" height="350" wmode="transparent" /] For more info...

Last updated: Apr 10, 2008   3:23 PM GMT  |  Blog: Our Latest Discovery
Genband Perspectives16: notes from day 1

Blog  Genband is a specialist in IP-based real time communications software for fixed wireline, mobile and cable service providers and large enterprises. [caption id="attachment_812" align="alignright" width="300"] Genband to telco engineers: "Yes people, there is a pool, but we do expect to see you in t...

Last updated: May 3, 2016   1:31 PM GMT  |  Blog: CW Developer Network
New mobility and digital identity: The vehicle for success

Blog  In the physical world, each person is unique, with their own set of relationships, personal preferences, financial profile, physical characteristics, past behaviors, future plans and so on -- the attributes that make up their identity. Being able to recognize each customer's unique identity makes i...

Last updated: Jun 27, 2018   6:46 PM GMT  |  Blog: IoT Agenda   |      Connected car, Customer personalization, IAM
Getting Into Linux Security (Part 2)

Blog  Earlier this month I started a series about breaking into the Linux security field (part 1: https://itknowledgeexchange.techtarget.com/security-admin/getting-into-linux-security-part-1/). I'm going to continue this with more tools of the trade to start learning. Shorewall I wrote an article about ...

Last updated: Jan 28, 2013   8:03 PM GMT  |  Blog: I.T. Security and Linux Administration
Who has control of your control systems?

Blog  Cybercriminals are constantly probing consumer IoT devices such as home routers, IP cameras and printers to find access points into the network. Once they have access, they can disrupt network functions, gather critical information and deliver malicious payloads. At the other end of the spectrum, cy...

Last updated: Oct 4, 2019   5:10 PM GMT  |  Blog: IoT Agenda   |      cyber-attacks, Internet of Things, iot
Secure Email Delivery Applications

Answer  I am currently searching for the best application or service to provide end to end security for delivering encrypted emails from one company to another accross the Internet. I need the solutions to provide Smime, PGP, TLS, SSL, etc. My goal is to some how have the app or user decide if the email n...

Last updated: Mar 1, 2005   9:21 AM GMT   |    Application security, Compliance, CRM
Safeguarding data - it's all in the process

Blog  David Lacy mentions in his latest blog that our ability to safeguard data depends upon "sensible application of well-established security technologies." I am in complete agreement and this remark also relates to our efforts to maintain regulatory compliance: as I discussed in my blog yesterday. At ...

Last updated: Dec 15, 2006   7:00 PM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Compliance, Risk assessment
PREV 1...30   40   50...66   67   68   69   70   71   72   73   74   75...   80   90   100...251 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: