Search Results | Application security
PREV 1...30   40   50...66   67   68   69   70   71   72   73   74   75...   80   90   100...249 NEXT
Sort by:  Most Relevant  |  Date
Software development in the global interconnected sandbox

Blog  Perforce has upped its software version management system with a new release featuring additional capabilities for "advanced distributed version control" to keep developers productive even when they are disconnected from the firm's shared versioning service. New replication technology is also said ...

Last updated: Apr 24, 2012   3:43 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
Security Forensics with Niksun or CA or Sandstorm

Answer  Does any have experience recording and tracking traffic with playback using any of these venders. I am looking for the best solution to provide Forensics on my network. Niksun or CA or Sandstorm Also on a side not I am lookign for a product to do secure email delivery. Please let me know if ...

Last updated: Mar 1, 2005   9:28 AM GMT   |    Application security, Bandwidth, Database
Windows 2008 Server Manager.

Blog  It took a while to get out of the habit of using Manage from right clicking on My Computer to manage my server. After all it has been embedded in my head over the last several years. Now with Windows 2008 we have a new application or console called Server Manager. Now you can use Server Manager to ...

Last updated: Jun 28, 2011   5:52 PM GMT  |  Blog: Karl's Windows Admin Tips & Tricks
Video: Install and configure SNORT on an XP PC

Blog  In this video, the instructor goes through the process of downloading, installing and configuring Snort as a sniffer and an intrusion detection system on a Windows XP machine. [kml_flashembed movie="" width="425" height="350" wmode="transparent" /] For more info...

Last updated: Apr 10, 2008   3:23 PM GMT  |  Blog: Our Latest Discovery
TechTarget's weekly roundup (6/19 - 6/26)

Blog   Compliance image via FreeImages Is regulatory compliance among your organization's biggest IT priorities this year? Find out why it's at the top of the list for many professionals in this week's roundup. 1. IT Priorities 2017 survey: Compliance initiatives in full throttle - Ben Cole (SearchCompli...

Last updated: Jun 26, 2017   11:48 AM GMT  |  Blog: Enterprise IT Watch Blog   |      Compliance, cybersecurity, DevOps
TechTarget's weekly roundup (8/28 - 9/4)

Blog   Security image via FreeImages What do you think of the Intel Management Engine kill switch? Check out its connection to a certain NSA program in this week's roundup. 1. Intel kill switch code indicates connection to NSA - Michael Heller (SearchSecurity) Researchers discovered an Intel kill switch...

Last updated: Sep 5, 2017   11:36 AM GMT  |  Blog: Enterprise IT Watch Blog   |      Intel, salesforce, Security
TechTarget's weekly roundup (10/30 - 11/6)

Blog   Storage image via FreeImages What odds do you give Violin Systems of long-term survival? Learn why the CEO thinks that profits are on the way in this week's roundup. 1. Violin Systems CEO Abbasi says profits coming in 2018 - Dave Raffo (SearchStorage) All-flash pioneer Violin emerges from bankrup...

Last updated: Nov 6, 2017   1:49 PM GMT  |  Blog: Enterprise IT Watch Blog   |      Azure, GDPR, Machine learning
Microsoft hires Linux security guru Crispin Cowan

Blog  Microsoft has added yet another big name to is Windows Security team: Crispin Cowan. These hirings have become old hat at this point, but this one has an interesting twist in that Cowan is renowned as a Linux security expert. He is the brains behind the StackGuard compiler, which is designed to turn...

Last updated: Jan 22, 2008   2:19 PM GMT  |  Blog: Security Bytes
IT organization of the future is a hybrid

Blog  In 2021, cloud computing is simply computing, corporate office parks are senior housing facilities and the IT organization of the futurehas been absorbed by the business. Oh, and Apple has lost its proprietary hold on mobile application development -- in court, no less -- giving every company out...

Last updated: Jul 27, 2011   2:52 PM GMT  |  Blog: TotalCIO
Genband Perspectives16: notes from day 1

Blog  Genband is a specialist in IP-based real time communications software for fixed wireline, mobile and cable service providers and large enterprises. [caption id="attachment_812" align="alignright" width="300"] Genband to telco engineers: "Yes people, there is a pool, but we do expect to see you in t...

Last updated: May 3, 2016   1:31 PM GMT  |  Blog: CW Developer Network
The 'dynamic' data centre is also the 'democratic' data centre

Blog  Application Delivery Networking company F5 Networks this week takes the wraps off of its BIG-IP version 11 software. This release is part of what F5 envisions as a dynamic data centre where services are provisioned on an application-by-application basis for better visibility and reporting of IT reso...

Last updated: Jul 25, 2011   2:06 PM GMT  |  Blog: CW Developer Network   |      Uncategorized
Secure Email Delivery Applications

Answer  I am currently searching for the best application or service to provide end to end security for delivering encrypted emails from one company to another accross the Internet. I need the solutions to provide Smime, PGP, TLS, SSL, etc. My goal is to some how have the app or user decide if the email n...

Last updated: Mar 1, 2005   9:21 AM GMT   |    Application security, Compliance, CRM
Application Protection - Part IV

Blog  The FCPA impacts IT control requirements of U.S. publicly held enterprises. Section 78m (b), in particular, documents the legislative rules and compliance requirements of internal control evaluation reporting with regard to management's assessment of internal controls. Section 78m (b) (2) through (5...

Last updated: Jun 22, 2009   8:41 PM GMT  |  Blog: IT Governance, Risk, and Compliance
Safeguarding data - it's all in the process

Blog  David Lacy mentions in his latest blog that our ability to safeguard data depends upon "sensible application of well-established security technologies." I am in complete agreement and this remark also relates to our efforts to maintain regulatory compliance: as I discussed in my blog yesterday. At ...

Last updated: Dec 15, 2006   7:00 PM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Compliance, Risk assessment
Plunging Through the Palo Alto Networks Firewall

Blog   Palo Alto Networks claims they can identify and control applications regardless of port, protocol, encryption, or evasive tactic. Due to the need for organizations to support protocols and applications not yet categorized by Palo Alto there is an underlying logic issue. Unless a company...

Last updated: Jan 4, 2011   5:43 PM GMT  |  Blog: Harmonizing Regulatory Compliance and Risk Management   |      @PaloAltoNetwork, @Security_Sifu, command-and-control
Keep a digital transformation strategy humming with these practices

Blog  The earliest days of a client's digital transformation strategy can be the make-or-break time for the entire initiative. Projects under the digital transformation banner may call for a company to reinvent its value proposition, drastically change its business model and overhaul its technology infra...

Last updated: Mar 29, 2019   3:45 PM GMT  |  Blog: Channel Marker   |      Change management, Digital transformation, managed serverices
Getting Into Linux Security (Part 2)

Blog  Earlier this month I started a series about breaking into the Linux security field (part 1: I'm going to continue this with more tools of the trade to start learning. Shorewall I wrote an article about ...

Last updated: Jan 28, 2013   8:03 PM GMT  |  Blog: I.T. Security and Linux Administration
Who has control of your control systems?

Blog  Cybercriminals are constantly probing consumer IoT devices such as home routers, IP cameras and printers to find access points into the network. Once they have access, they can disrupt network functions, gather critical information and deliver malicious payloads. At the other end of the spectrum, cy...

Last updated: Oct 4, 2019   5:10 PM GMT  |  Blog: IoT Agenda   |      cyber-attacks, Internet of Things, iot
70-443 Chapter 2

Blog  This chapter is all about cosolidation and multiple instances. Not a very long chapter but a great read. I have to say that this cleard up some misconceptions on my part and I really enjoyed the chapter. This chapter talks about instance design and consolidation strategy. I must say that I was a fir...

Last updated: Feb 13, 2010   8:00 AM GMT  |  Blog: The Multifunctioning DBA
New mobility and digital identity: The vehicle for success

Blog  In the physical world, each person is unique, with their own set of relationships, personal preferences, financial profile, physical characteristics, past behaviors, future plans and so on -- the attributes that make up their identity. Being able to recognize each customer's unique identity makes i...

Last updated: Jun 27, 2018   6:46 PM GMT  |  Blog: IoT Agenda   |      Connected car, Customer personalization, IAM
PREV 1...30   40   50...66   67   68   69   70   71   72   73   74   75...   80   90   100...249 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: