Corporate Partners

Application Security News, Features, and Interviews

News

More Application Security news

Reviews

USB Secure Flash Drive Product Review

A vast majority of today’s workforce use USB memory sticks, they offer unequalled convenience for transferring data. In most situations, if the data is not confidential, a standard USB stick quite acceptable, but what do you use if your data is sensitive?

Enex Testlab | 24 Aug | Read more

WatchGuard XCS770R Email Security Appliance Review

In order to improve productivity and minimise risk, most organisations need a reliable method of protecting their employees from unwanted email (spam) and malicious software (malware). In addition, it is also necessary to protect the corporate network by restricting access to inappropriate content.

Enex Testlab | 22 Jun | Read more

More Application Security reviews

Slideshows

In Pictures: CSO's Identity Driven Access Management Round Table

It's the centenary of the commencement of World War One. Back then, there were borders to protect. The soldiers knew who they were fighting and there were very few incursions where one side crossed a border undetected. Today's battles are different. The bad guys are stealing the good guys’ passwords and identities to get access to whatever they want. And they often wait weeks or even months before revealing their true objectives.

Abigail Swabey | 22 Oct | Read more

More Application Security slideshows

Features

NEWS FEATURE: Debate rages over how to manage personal mobile devices used for work

Increasingly, businesses accept the idea that employees should be able to <a href="http://www.networkworld.com/columnists/2011/072711-andreas.html?hpg1=bn">use their personal mobile devices</a>, such as <a href="http://www.networkworld.com/slideshows/2010/061510-smartphone-history.html">smartphones</a> and tablets, for work. But debate is raging as to whether these employee-owned devices should be <a href="http://www.networkworld.com/news/2011/061511-smartphones-tablets-security.html">managed and secured</a> exactly as corporate-owned devices might be.

Ellen Messmer | 28 Jul | Read more

5 open source security projects to watch

Data security is always top of mind for CIOs and CSOs, and there is no shortage of challenges when it comes to picking the right tool for the job. With network and software vulnerabilities growing at a perpetual rate, good security software can help defend against many of the large-scale threats that occur locally and from all over the Internet. In this edition of 5 open source things to watch, we take a look at security products that will guard against threats without robbing your kitty.

Rodney Gedda | 20 Jan | Read more

5 'Great' Open-source Desktop Security Applications

Contributions from free and open software makers can be found throughout the tech world. From your datacenter to the desktop and everywhere in between; there's an open solution to your computing needs. This is no less true in information security. My focus in this article is the several outstanding information security desktop tools that personify the innovation and ingenuity of the FOSS (Free and Open Source Software) world. Please keep in mind that all of these applications (except one) are cross-platform so you can find appropriate versions on whatever you run (BSD, Mac OSX, Linux or Windows). The examples herein, however, will be catered to the largest install base (statistically): Microsoft Windows.

Joseph Guarino | 01 Apr | Read more

More Application Security features

Tutorials

Ten tips to secure client VPNs

If you have given your trusted employees and key contractors remote access to your network via a client virtual private network (VPN), congratulations! By now, you have seen the productivity and cost benefits from allowing collaboration that surmounts geographical separation.

Martin Heller | 03 Oct | Read more

More Application Security tutorials

Opinions

A Look Back At Information Security in 2014

With the major financial card breaches at global retailers, as well as a number of SSL/TLS vulnerabilities, it’s possible you may have missed a few other under-reported security issues that provided valuable lessons to the general technology community in 2014.

Thu Pham | 10 Dec | Read more

Buyer Beware: Five Cybersecurity Consumer Tips for the Holiday Season

Last year, news that US retailer Target’s point-of-sale systems were compromised resulting in the theft of more than 40 million payment card numbers hit Australian headlines. A steady stream of breach stories throughout the year further raised awareness of the issue in this part of the world. But given there are no mandatory breach disclosure laws in this country, you may be wondering ‘If my details were stolen, how would I even know?’ Practically speaking, you’re probably thinking ‘What can I do to protect myself this festive season?’

Chris Pogue | 10 Dec | Read more

Business Applications as a Service (BAaaS)

The rise and rise of the as-a-Service (XaaS) model continues. The various models based around the XaaS approach are all forecast to continue growing rapidly as organizations go on taking advantage of the increased flexibility, lower CAPEX (Capital Expenditure) and on-demand nature of the service. Gartner predicts that Infrastructure-as-a-Service (IaaS) will grow at a CAGR (Compound annual Growth Rate of 41.3 per cent through 2016, while Platform-as-a-Service (PaaS) will hit 27.7 per cent CAGR in the same period. The Software-as-a-Service (SaaS) market will grow at 19.5 per cent CAGR in that time too, demonstrating how significant the cloud delivery of IT services has become.

Gordon Makryllos | 01 Dec | Read more

More Application Security opinons

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place