MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
January 30, 2007
Clint Boulton
SPI Lets 'Phoenix' Fly For Web Security SPI Dynamics created Phoenix, a new Web application security architecture to analyze Web 2.0 applications and find previously undetectable Web flaws. mark for My Articles similar articles
InternetNews
February 20, 2007
Clint Boulton
Douse Application Security Flaws With Watchfire Watchfire's AppScan Enterprise 5 allows developers to point and click to analyze applications for vulnerabilities. mark for My Articles similar articles
InternetNews
April 16, 2009
Sean Michael Kerner
HP Rolls WebInspect 8.0 for Flash Security HP is expanding its security solutions with new Web 2.0, user behavior and Flash analysis capabilities. This new set of security solutions aims to help enterprises see the big security picture. mark for My Articles similar articles
InternetNews
July 16, 2007
Sean Michael Kerner
Cenzic Takes Competitor Pieces After SPI Dynamics and Watchfire are are acquired by HP and IBM, Cenzic keeps some of each for its own good. mark for My Articles similar articles
InternetNews
October 5, 2009
HP Hacking Challenge Yields Surprising Results If you thought automated security tools were enough, think again. mark for My Articles similar articles
InternetNews
November 9, 2009
Firefox Tops Vulnerability List New study places Firefox at the top of vulnerability list for for the first half of 2009. mark for My Articles similar articles
PC Magazine
June 22, 2005
Larry Seltzer
Make Your Network Safer by Attacking It A number of excellent tools can help you find out where you're network is vulnerable. mark for My Articles similar articles
InternetNews
June 19, 2007
Clint Boulton
HP 'SPIs' Web Application Security HP sets its sights on Web application software maker SPI Dynamics. mark for My Articles similar articles
InternetNews
July 31, 2006
Clint Boulton
SQL Injection Threatens to Needle Web Users A scripting flaw that lets perpetrators pull any content from a database is a scary tool for IT admins. mark for My Articles similar articles
PC Magazine
December 30, 2003
Matthew D. Sarrel
Network Security: Know Your Weaknesses Vulnerability scanners identify your network's insecurities. Which one of these 6 tested products will watch your back? mark for My Articles similar articles
InternetNews
November 6, 2008
Richard Adhikari
Adobe Unveils Another Set of Critical Patches For the second time this week, Adobe Systems has released a set of critical vulnerability patches. mark for My Articles similar articles
CIO
May 15, 2003
Scott Berinato
The Bugs Stop Here Don't blame Microsoft. Don't blame the hackers. Blame yourself for insecure software. Better yet, stop blaming and start moving toward operational excellence. mark for My Articles similar articles
InternetNews
October 1, 2007
Sean Michael Kerner
HP Settles Patent Dispute With Cenzic Cenzic has reached an agreement with HP that will result in the two vendors cross-licensing each other's patents. mark for My Articles similar articles
InternetNews
March 16, 2004
Ryan Naraine
Microsoft Shares Own Security Secrets The software giant releases a technical case study with details of security methodologies it uses to ward off malicious hacker attacks. mark for My Articles similar articles
InternetNews
June 6, 2007
Clint Boulton
Where There's IBM, There's Watchfire IBM today agreed to buy security and compliance testing software vendor Watchfire for an undisclosed sum. mark for My Articles similar articles
CIO
February 15, 2006
Christopher Lindquist
Ajax Arrives for the Enterprise Ajax is quickly gaining acceptance worldwide as developers look to design Web interfaces that hook users with their speed and ease of use. mark for My Articles similar articles
The Motley Fool
June 20, 2007
Tom Taulli
HP Loads Up on Software The computer maker is making more inroads into the lucrative software space. Investors, take note. mark for My Articles similar articles
Insurance & Technology
May 14, 2005
Michael Cohn
7 Myths About Network Security While hacker tools are growing more sophisticated and automated, many organizations have a false sense of security about their own data and networks. Take a look at these security myths to see if your data is as secure as you think it is. mark for My Articles similar articles
InternetNews
October 5, 2006
Andy Patrizio
After The Buzz, Ajax Goes To Work Ajax is an example of the whole being greater than the sum of its parts. And the big developers have all caught the Ajax religion. mark for My Articles similar articles
InternetNews
April 15, 2009
Alex Goldman
Oracle Issues 43 Patches, Nails Database Exploits Oracle's latest patch update fixes critical flaws in two key software products and other flaws across the product line, but Oracle could do more to help administrators. mark for My Articles similar articles
T.H.E. Journal
February 2009
John K. Waters
IT Security: Target: The Web No longer focused on the network, hackers have a bull's eye now trained squarely on web-based applications. What, if anything, can school districts do to thwart them? mark for My Articles similar articles
InternetNews
July 25, 2005
Sean Michael Kerner
SANS: No Safety From Vulnerabilities IE vulnerabilities still abound, but Apple, Mozilla and Real Player users have little to gloat about. mark for My Articles similar articles
InternetNews
October 8, 2009
Google Says, Have Your AJAX and SEO, Too Google puts a standard on the table for making AJAX-based Web sites crawlable. mark for My Articles similar articles
InternetNews
May 19, 2006
Andy Patrizio
Google Cleans Ajax for Java Google Web Toolkit takes regular Java apps and converts them to the often-incompatible JavaScript for all browsers. mark for My Articles similar articles
InternetNews
January 4, 2006
Sean Michael Kerner
CERT's Best-Worst Vulns of 2005 Though there were more reported vulnerabilities, Linux is still seen as likely more secure than Windows. mark for My Articles similar articles