Search Results | Application security
PREV 1...4   5   6   7   8   9   10   11   12   13...   20   30   40   50   60   70...249 NEXT
Sort by:  Most Relevant  |  Date
links for 2008-04-12

Blog   EMC unveils new solution aimed at advancing IT and security operations Working to converge security and operations - The solution is based on EMC's Voyence Control product for Network Change and Configuration Management (NCCM) and the RSA enVision product for Security Information and Event Ma...

Last updated: Apr 12, 2008   4:38 PM GMT  |  Blog: Adventures in Data Center Automation   |      DataCenter
Cloud native series: Avi Networks defines pros & cons

Blog  This is a guest post for the Computer Weekly Developer Network written by Ides Vanneuville in his capacity as director of systems engineering for EMEA at Avi Networks. Avi Networks is known for its elasticsoftware defined application servicesfabric that provides per-app load balancing, predicti...

Last updated: Nov 3, 2017   9:03 AM GMT  |  Blog: CW Developer Network
Cigital's Gary McGraw talks cloud security with Chris Hoff

Blog  Security needs to pay more attention to the protocols which bind the applications and infrastructure together. That's where the cracks are appearing. What is cloud computing? In an interview with Cigital's software security expert Gary McGraw, Network security expert Christopher Hoff tries to answ...

Last updated: Oct 24, 2009   2:41 PM GMT  |  Blog: Security Bytes
Progress ups front-end & back-end developer tools

Blog  Progress has (logically enough) filled its week with a bushel of product announcements to coincide with its NEXT 2018 conference, which was staged this month in Boston, Massachusetts. Among the platform and tools updated at this time is the release of Progress Sitefinity 11. This is a software tha...

Last updated: May 30, 2018   4:23 PM GMT  |  Blog: CW Developer Network
source code

Blog  Source code is the fundamental component of a computer program that is created by a programmer. Continued... Quote of the Day "With the presence of Web applications across virtually every facet of the business, it's important that you do what you can to minimize your security risks. This is where t...

Last updated: Apr 14, 2017   2:32 PM GMT  |  Blog: Word of the Day: Tech Definitions from   |      Source code
Word of the Day: application sandboxing

Blog   "There is no magical wand to tap over your IT department, or magic crypto fairy dust that will solve the problem of security. Sandboxing is another weapon in our security arsenal, and IT will take all the weapons it can get." -- Gary McGraw Today's Word of the Day is application sandbo...

Last updated: Dec 7, 2012   8:37 PM GMT  |  Blog: Word of the Day: Tech Definitions from
Word of the Day - enterprise wipe

Blog   "The ability to remotely wipe any managed device is a staple of many enterprise mobile security policies, and it's vital to preventing sensitive corporate data from being compromised." -- Lisa Phifer Today's Word of the Day is enterprise wipe, a security feature offered by many mobile ...

Last updated: Jan 16, 2013   4:30 PM GMT  |  Blog: Word of the Day: Tech Definitions from
Firewall application nightmares for dummies

Blog  Enterprise security rarely ranks in the top ten favourite programming related disciplines for many software application developers who simply want to build, construct, enhance and deploy as their main priority goals. But where vulnerabilities are locked down, Security Policy Management (SPM) compan...

Last updated: Feb 13, 2013   11:29 AM GMT  |  Blog: CW Developer Network   |      Uncategorized
A matter of life and death

Blog  I was recently reading through some literature provided by a vendor describing the security behind a particular solution under consideration. The literature in question describes a multi-layered architecture with domain seperation, and use of encrypted channels between client and server. The documen...

Last updated: Jan 8, 2007   8:00 AM GMT  |  Blog: Risk Management with Stuart King and Duncan Hart   |      Encryption, risk
Google reaches for an application security blanket

Blog  While Google is in the news after coming under antitrust scrutiny from the U.S. Justice Department due to its planned purchase of online advertising juggernaut DoubleClick, its purchase of GreenBorder attracted, well, a bit less attention.One of the worst-kept secrets at Google is its ambitious plan...

Last updated: May 30, 2007   6:47 PM GMT  |  Blog: Channel Marker
Trend Micro's Android infection realities... and other stories

Blog  The Computer Weekly Developer Network blog ran a piece recently entitled "What can software application developers expect from InfoSec?" -- which, if anything was an open invitation for additional commentary on this subject. There was (arguably) a fair slice of vendor stuff and nonsense flying arou...

Last updated: May 13, 2012   3:43 PM GMT  |  Blog: CW Developer Network   |      Uncategorized
Western Union cloud security tool doubles as business enabler

Blog  Problem/solution As director of information security at Western Union, in charge of emerging technology and cloud security, David Levin has a deep appreciation of the risks attendant to cloud applications. He also recognizes that workers are under tremendous pressure to deliver results, and if a ...

Last updated: Sep 10, 2014   9:07 PM GMT  |  Blog: TotalCIO   |      CIO
Web App Security

Answer  Why HSTS header are not being used even in most secure web applications i.e. banking domains while it is recommended for best security practice?

Last updated: Jul 27, 2016   11:09 AM GMT   |    , Web security
Payment Card Industry Compliance | Its much more than just PCI DSS

Blog  When people think of payment card industry compliance, they naturally think of PCI DSS compliance. And to be fair, the vast majority of organizations undergoing PCI DSS compliance are merchants and service providers who have to either conduct their own self assessment or go through an on-site assess...

Last updated: Mar 23, 2009   11:53 AM GMT  |  Blog: Regulatory Compliance, Governance and Security
Top 25 dangerous coding errors

Blog  Security experts explain the new Top 25 Errors list. Includes Bob Martin of MITRE Corp., Paul Kurtz, a principal author of the U.S. National Strategy to Secure Cyberspace and application security testers Jacob West of Fortify Software and Chris Wysopal of Veracode.

Last updated: Jan 14, 2009   9:31 PM GMT  |  Blog: Security Wire Weekly
Static source code analysis turned on its head

Blog  If you're into source code analysis and Web application security, then you know who Caleb Sima is. Sima, for the uninitiated is cofounder of SPI Dynamics and the guy who helped build the popular static source code analyzer, DevInspect. SPI Dynamics was scooped up three years ago by HP and until rece...

Last updated: Mar 5, 2010   1:12 AM GMT  |  Blog: Security Bytes
Jack Danahy at IBM Innovate: Changes in AppScan part of Secure by Design announcement

Blog  IBM Innovate has given me all kinds of opportunities to speak with IBM's top execs and hear the latest news and announcements in their Rational product line. I spoke today with Jack Danahy, Security Executive Office for the Office of the CTO, Rational at IBM. Danahy was the original founder and CEO...

Last updated: Jun 8, 2010   8:47 PM GMT  |  Blog: Software Quality Insights
How to improve IoT security and resilience with SD-WAN and SDP

Blog  As IoT devices connect to our networks, we need to provide secure, reliable connectivity to the back-end applications that manage and extract information from these devices. But all too often, current security architectures risk exposing those applications to network attacks, such as denial of servi...

Last updated: Apr 30, 2018   4:57 PM GMT  |  Blog: IoT Agenda   |      Availability, Internet of Things, iot
Promisec offering free endpoint audits through VARs

Blog  When Promisec audits its customers endpoint security, the work typically comes with a price tag of at least $10,000. But now the Israel-based vendor is giving away the service -- and doing so through the channel. Promisec will introduce the free service tomorrow. Company executives are betting th...

Last updated: May 21, 2007   4:14 PM GMT  |  Blog: Channel Marker
Vista to make WAN optimization a thing of the past?

Blog  TechTarget's networking reporter Andrew R. Hickey wrote an insightful piece on WAN optimization technologies embedded in Microsoft Windows Vista and Longhorn Server and how they could make separateWAN optimization boxes obsolete: Vista and Longhorn contain redesigned TCP/IP stacks, quality of serv...

Last updated: Apr 4, 2007   5:41 PM GMT  |  Blog: Storage Soup
PREV 1...4   5   6   7   8   9   10   11   12   13...   20   30   40   50   60   70...249 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: