Not enough attention has been paid to Web security yet; here are ways to check, and secure, your Web applications … continue reading
There are more than a few ways information can inadvertently slip out; here’s how to keep that from happening … continue reading
A lack of interest from upper management and a lack of education are contributing to potentially costly vulnerabilities … continue reading
Security experts warn that cybercriminals will be better able to take advantage of tactics that cover their tracks … continue reading
Fortify On-Demand is designed to protect applications running in cloud environments … continue reading
Stress tests on one’s security systems are best carried out by testers working for the company, not outsiders … continue reading
String and hybrid analysis are designed to address vulnerabilities at earliest stage of development … continue reading
Titus Metadata Security for SharePoint allows permissions to be assigned based on the recipient’s Active Directory properties … continue reading
Ruminations on maximizing your Twitter profile, business intelligence as a predictor, and what Stuxnet means for security … continue reading
The IT security industry is finding new ways to survive and thrive in today’s market … continue reading
The growth of e-commerce has revealed that fraud detection is an under-emphasized area, which presents a growth opportunity … continue reading
CodeArmor Intelligence 3.0 also uses Salesforce’s Chatter collaboration features to assist in security decision-making … continue reading