Search Results | Application security
PREV 1...5   6   7   8   9   10   11   12   13   14...   20   30   40   50   60   70...249 NEXT
Sort by:  Most Relevant  |  Date
Risky business? How to manage IoT security in the enterprise

Blog  Nearly every week, we hear about a new cyberattack or security breach. In fact, more than 1.7 billion identities have been exposed in data breaches in the past eight years. As the world becomes increasingly interconnected, organizations become susceptible to more risk. While IoT presents new opportu...

Last updated: Aug 1, 2018   8:20 PM GMT  |  Blog: IoT Agenda   |      Digital security, Internet of Things, iot
SQL injection flaw leaves door wide-open to valuable user information on a popular file sharing site

Blog  This week, a trio of hackers based out of Argentina uncovered various entry points into the popular (and controversial) file-sharing site Pirate Bayusing SQL injection flaws contained in the site. The infiltration gained them access to upwards of four million user profiles containing names, addres...

Last updated: Jul 8, 2010   8:53 PM GMT  |  Blog: Software Quality Insights
How soon is PCI scan required on new application?

Answer  Hello, The larger team I work in is about to release a new ecommerce website that allows the secure storage and usage of personal and corporate credit cards. As far as system components go, the payment card info. is stored securely in Oracle and the DB itself is in the private network behind a speci...

Last updated: Mar 30, 2010   11:48 PM GMT   |    PCI compliance
Security!!

Answer  What security measures are considered when designing a web-application (besides the SSL encryption)? And what technologies are used to protect the application from brute-force, phishing, and pharming attacks."

Last updated: Jun 24, 2008   7:30 AM GMT   |    Risk management, Security protocols, Web security
Secure connectivity for the internet of things

Blog  In a provocative 2015 report, Gartner analysts Karamouzis, Jivan and Notardonato discussed the disruptive nature of smart machines, cognitive technologies and algorithmic business models. By classifying content, finding patterns and extrapolating generalizations from those patterns, these technologi...

Last updated: Jan 26, 2017   4:29 PM GMT  |  Blog: IoT Agenda   |      Application security, Internet of Things, iot
Massive IoT: Security is vital

Blog  While it is early days for 5G, one thing is clear: security and privacy will remain fundamental requirements, with the changes foreseen for 5G likely to broaden the range of attractive attack targets. We believe that massive IoT, one of the main application segments for 5G identified by standardizat...

Last updated: Sep 28, 2016   4:30 PM GMT  |  Blog: IoT Agenda   |      5G, 5G technology, Authentication
Mobile security systems: Most have them; some sort of do

Blog  Earlier this month, I interviewed Gartner analyst Dionisio Zumerle about the trends influencing the mobile device security market and why traditional endpoint security models "just dont fit mobile." Fortunately, organizations today aren't using those technologies for mobile devices, he said. "T...

Last updated: Aug 1, 2016   0:52 AM GMT  |  Blog: TotalCIO
Why is SQL Injection still a problem?

Blog  SQL Injection is probably the most popular attack vector for hackers when they attempt to break into databases. The reason for this is that it is so easy for an attacker to gain access to the system, and typically to get pretty high level permissions to a database engine so that they can then expo...

Last updated: Jul 30, 2012   4:00 PM GMT  |  Blog: SQL Server with Mr. Denny   |      SQL
Astaro Security Gateway Update

Blog  Astaro has released version 8.002 of its Astaro Security Gateway (ASG) product. The ASG is a security solution based on Linux that provides network security, mail security, and web application firewall technology. The update is mostly a bug fix release and more information is available here: http...

Last updated: Oct 8, 2010   2:56 PM GMT  |  Blog: Secure Penguin: Linux Security Topics
Consumer apps, devices invading the enterprise

Blog  Many employees are using social networking applications at work and bringing personal devices into the office despite corporate policies, according to a survey released Thursday by Cisco. Fifty-six percent of the 512 IT security professionals around the world who were polled in the survey said thei...

Last updated: Jun 24, 2010   10:41 PM GMT  |  Blog: Security Bytes
Taking Back IT - SaaS Portfolio Management

Blog  Question:New SaaS applications seems to be popping up everywhere in my organization. How can IT address the pressure from the business units to support these ad hoc applications and integrate them into the overall enterprise IT portfolio? Forrester forecasts the SaaS global market will grow fro...

Last updated: May 30, 2011   2:00 AM GMT  |  Blog: Ask the IT Consultant
Advantage to expand IT networks to enable physical security applications like IP video

Answer  A questions emailed to us Is there a clear advantage and ROI to expand IT networks to enable physical security applications such as IP video. These applications typically require significant bandwidth resources.

Last updated: Feb 6, 2008   4:47 PM GMT   |    Physical security, Security
Battle of the IoT networks: Cellular versus Wi-Fi

Blog  When it comes to the internet of things, perhaps the key enabling technology is wireless networking technologies. Without the two primary wireless data networking technologies -- cellular and Wi-Fi -- almost every IoT device would require a wired connection to the internet, dramatically limiting the...

Last updated: Apr 25, 2018   8:32 PM GMT  |  Blog: IoT Agenda   |      802.11, Application development, Bandwidth
Google developing XSS fuzzing tool called Lemon

Blog  The folks at Google apparently aren't much for summer vacations. The company's security team has been at work on a automated tool for finding cross-site scripting vulnerabilities in Web applications. Google's new tool is called Lemon, and is essentially a fuzzer purpose-built to find XSS flaws, whic...

Last updated: Jul 17, 2007   2:42 PM GMT  |  Blog: Security Bytes
TechTarget's weekly roundup (4/1 - 4/8)

Blog   Mobile image via Shutterstock Mobile was a big hit in this week's roundup. Major topics included enterprise mobile applications and Facebook Home's effect on mobile security. 1. Forrester VP says enterprise mobile applications miss the mark - James Denman (SearchSoftwareQuality) During his recent ...

Last updated: Apr 8, 2013   7:57 PM GMT  |  Blog: Enterprise IT Watch Blog
Extending DevOps visibility to balance security & scale

Blog  This is a guest post for the Computer Weekly Developer Network blog 'penned' by Jason Kent in his role as VP of web application security at Qualys. Yin Yang application options Application developers have new options available to them for delivering services at startling new paces of innovation. Fro...

Last updated: Jan 6, 2017   9:33 AM GMT  |  Blog: CW Developer Network
Web application firewall (WAF)

Blog  A Web application firewall (WAF) is a firewall that monitors, filters or blocks data packets as they travel to and from a Web application. Continued Quote of the Day "Although WAFs are most helpful for applications where source code is not available, other applications benefit because WAFs can p...

Last updated: Apr 11, 2017   7:56 PM GMT  |  Blog: Word of the Day: Tech Definitions from WhatIs.com   |      firewall, PCI DSS, WAF
Apply Modern Security to Legacy Software with EMET

Blog  Windows 7 is more secure than WIndows XP. Period. Likewise, Office 2010 is more secure than Office 2007. It is not that WIndows 7, or Office 2010, or any other new OS or application is magical, it is just the natural evolution of things. New technologies are introduced. New attack techniques are dev...

Last updated: May 25, 2011   4:22 PM GMT  |  Blog: The Security Detail
AJAX platform injects security

Blog  Kyle Adams and Al Huizenga of new startup Mykonos talk about their new platform that injects security into the software development lifecycle for AJAX applications. Also, security expert David Mortman on cloud computing.

Last updated: Apr 23, 2009   3:43 PM GMT  |  Blog: Security Wire Weekly
Security boost for LAMP stack

Blog  LAMP, an open-source Web development platform based on Linux, Apache, MySQL, and PHP, is getting some added protection from attacks thanks to Metaforic. Metaforic, a provider of anti-tamper solutions, announced that upon request it will provide free versions of secured Apache and MySQL to enterpris...

Last updated: Dec 10, 2008   4:03 PM GMT  |  Blog: Software Quality Insights
PREV 1...5   6   7   8   9   10   11   12   13   14...   20   30   40   50   60   70...249 NEXT

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: