Similar Articles |
|
InternetNews January 30, 2007 Clint Boulton |
SPI Lets 'Phoenix' Fly For Web Security SPI Dynamics created Phoenix, a new Web application security architecture to analyze Web 2.0 applications and find previously undetectable Web flaws. |
InternetNews February 20, 2007 Clint Boulton |
Douse Application Security Flaws With Watchfire Watchfire's AppScan Enterprise 5 allows developers to point and click to analyze applications for vulnerabilities. |
InternetNews April 16, 2009 Sean Michael Kerner |
HP Rolls WebInspect 8.0 for Flash Security HP is expanding its security solutions with new Web 2.0, user behavior and Flash analysis capabilities. This new set of security solutions aims to help enterprises see the big security picture. |
InternetNews July 16, 2007 Sean Michael Kerner |
Cenzic Takes Competitor Pieces After SPI Dynamics and Watchfire are are acquired by HP and IBM, Cenzic keeps some of each for its own good. |
InternetNews October 5, 2009 |
HP Hacking Challenge Yields Surprising Results If you thought automated security tools were enough, think again. |
InternetNews November 9, 2009 |
Firefox Tops Vulnerability List New study places Firefox at the top of vulnerability list for for the first half of 2009. |
PC Magazine June 22, 2005 Larry Seltzer |
Make Your Network Safer by Attacking It A number of excellent tools can help you find out where you're network is vulnerable. |
InternetNews June 19, 2007 Clint Boulton |
HP 'SPIs' Web Application Security HP sets its sights on Web application software maker SPI Dynamics. |
InternetNews July 31, 2006 Clint Boulton |
SQL Injection Threatens to Needle Web Users A scripting flaw that lets perpetrators pull any content from a database is a scary tool for IT admins. |
PC Magazine December 30, 2003 Matthew D. Sarrel |
Network Security: Know Your Weaknesses Vulnerability scanners identify your network's insecurities. Which one of these 6 tested products will watch your back? |
InternetNews November 6, 2008 Richard Adhikari |
Adobe Unveils Another Set of Critical Patches For the second time this week, Adobe Systems has released a set of critical vulnerability patches. |
CIO May 15, 2003 Scott Berinato |
The Bugs Stop Here Don't blame Microsoft. Don't blame the hackers. Blame yourself for insecure software. Better yet, stop blaming and start moving toward operational excellence. |
InternetNews October 1, 2007 Sean Michael Kerner |
HP Settles Patent Dispute With Cenzic Cenzic has reached an agreement with HP that will result in the two vendors cross-licensing each other's patents. |
InternetNews March 16, 2004 Ryan Naraine |
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. |
InternetNews June 6, 2007 Clint Boulton |
Where There's IBM, There's Watchfire IBM today agreed to buy security and compliance testing software vendor Watchfire for an undisclosed sum. |
CIO February 15, 2006 Christopher Lindquist |
Ajax Arrives for the Enterprise Ajax is quickly gaining acceptance worldwide as developers look to design Web interfaces that hook users with their speed and ease of use. |
The Motley Fool June 20, 2007 Tom Taulli |
HP Loads Up on Software The computer maker is making more inroads into the lucrative software space. Investors, take note. |
Insurance & Technology May 14, 2005 Michael Cohn |
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. |
InternetNews October 5, 2006 Andy Patrizio |
After The Buzz, Ajax Goes To Work Ajax is an example of the whole being greater than the sum of its parts. And the big developers have all caught the Ajax religion. |
InternetNews April 15, 2009 Alex Goldman |
Oracle Issues 43 Patches, Nails Database Exploits Oracle's latest patch update fixes critical flaws in two key software products and other flaws across the product line, but Oracle could do more to help administrators. |
T.H.E. Journal February 2009 John K. Waters |
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? |
InternetNews July 25, 2005 Sean Michael Kerner |
SANS: No Safety From Vulnerabilities IE vulnerabilities still abound, but Apple, Mozilla and Real Player users have little to gloat about. |
InternetNews October 8, 2009 |
Google Says, Have Your AJAX and SEO, Too Google puts a standard on the table for making AJAX-based Web sites crawlable. |
InternetNews May 19, 2006 Andy Patrizio |
Google Cleans Ajax for Java Google Web Toolkit takes regular Java apps and converts them to the often-incompatible JavaScript for all browsers. |
InternetNews January 4, 2006 Sean Michael Kerner |
CERT's Best-Worst Vulns of 2005 Though there were more reported vulnerabilities, Linux is still seen as likely more secure than Windows. |