Topic: security

The yin and yang of SharePoint

Eric Darbe talks about the conflict between wide internal SharePoint adoption and security concerns … continue reading

Survey: Developers still not doing enough to ensure security

SQL injections and cross-site scripting vulnerabilities remain despite years of drumbeating on the subject … continue reading

Zeichick’s Take: Securing the data

Security can’t account for every last threat or vulnerability, but programmers should still strive for maximum protection … continue reading

Richard Clarke talks cyber crime

Criminality, espionage, warfare and activism are the impetuses for today’s hackers … continue reading

From the Editors: Preparing for Windows 8

The Metro interface will force at least some adaptation; meanwhile, what can we do to cut down on the same security holes? … continue reading

How can you stay one step ahead in security for the cloud?

Frequently the biggest vulnerability of an application lies in the very code itself … continue reading

Department of Homeland Security lays down security suggestions

Common Weakness Enumeration version 2.0 highlights flaws in software development practices … continue reading

Move to cloud drives security efforts, report shows

The third annual HP/Capgemini World Quality Report also points out increasing use of the cloud in developing economies … continue reading

Are your Web apps safe?

Not enough attention has been paid to Web security yet; here are ways to check, and secure, your Web applications … continue reading

Toxic Personalities: Preventing the Spread of Confidential Information

There are more than a few ways information can inadvertently slip out; here’s how to keep that from happening … continue reading

Survey reveals that security and quality processes are not being followed

A lack of interest from upper management and a lack of education are contributing to potentially costly vulnerabilities … continue reading

Creative cybercriminals will thrive in 2011

Security experts warn that cybercriminals will be better able to take advantage of tactics that cover their tracks … continue reading

DMCA.com Protection Status