The search giant's efforts to become a viable alternative for enterprises looking to store and manage their data in the cloud will largely be determined by its ability to provide ironclad security.
Increasingly, security is becoming more about meeting the needs of the business and less about building a fortress. Using and applying meaningful metrics is critical first step.
A study shows that while most SMBs worry about small business computer security, they have no idea how to prevent it or how to protect themselves from bank fraud and identity theft.
Microsoft issued a security advisory on Thursday for a vulnerability in two SharePoint products....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.
Microsoft and Adobe are working together on the security patch process....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.
A pair of high-profile security and privacy breaches involving two of the world's most important technology companies has the FCC and FBI calling for action.
While enterprise security spends its time worrying about network-based attacks, the number of data breaches chalked up to Web applications continues to grow. Are you fighting yesterday's battles, too?
While enterprise security spends its time worrying about network-based attacks, the number of data breaches chalked up to Web applications continues to grow. Are you fighting yesterday's battles, too?
We are worried about the security of our website containing the login-button to our saas-application.
Security measures put in place for our application won't do us much good if the website is hacked. The login button could be redirected to some malicious copy of our app.
The product website is maintained by people outside the dev team. Those…
I am trying to use a WCF client to call a third party web service.
The web Service usses username token authentication WSS-Security 1.0 Soap Message Security
Here is a sample soap authentication header for what the web service expects
<soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"…
Has anyone in the stackoverflow community ever studied the security characteristics of various J2EE frameworks? I would love to understand what framework best aligns with the Web Application Security Framework Manifesto…
In this case security means building security (access control, alarm systems, etc). And I am not talking about working directly with the hardware, more focused on web based applications/api's that clients or companies…
I have a spring TextEncryptor defined like this
<bean id="textEncryptor" class="org.springframework.security.crypto.encrypt.Encryptors"
factory-method="text">
…
I've exposed several web services in our product using java and WS-Security. One of our customers wants to consume the web service using Coldfusion. Does coldfusion support ws-security? Can I get around it by writing a…
I am trying to sign a token object using SHA1.
I am using bouncycastle as the security provider.
Whenever the program tries to sign something it gives me this error.
java.security.SignatureException:…
Are there any security issues keeping the .NET PDB files on the real server?
I know that throwing exceptions might take a bit longer , but who throws exceptions during normal execution anyway? :-)
…
Hi everyone,
I have changed the Configure::write('Security.salt', '############'); value in the file
config/core.php
file to a '256-bit hex key'. Is it safe or a good practice to change these…