MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
February 2, 2007
Clint Boulton
Caleb Sima, CTO, SPI Dynamics Web application security gets a boost with Project Phoenix from SPI Dynamics. mark for My Articles similar articles
InternetNews
April 17, 2007
Sean Michael Kerner
Watchfire Expands to Open Source Ecosystem Application security vendor Watchfire is opening up its AppScan product to help extend its vulnerability scanning capabilities. mark for My Articles similar articles
InternetNews
January 30, 2007
Clint Boulton
SPI Lets 'Phoenix' Fly For Web Security SPI Dynamics created Phoenix, a new Web application security architecture to analyze Web 2.0 applications and find previously undetectable Web flaws. mark for My Articles similar articles
InternetNews
November 13, 2007
Sean Michael Kerner
IBM on Fire Five months after being acquired by IBM, Watchfire is out with its latest release of its security scanning product AppScan. mark for My Articles similar articles
InternetNews
September 22, 2008
Sean Michael Kerner
IBM Targets Security at Developers AppScan Developer Edition is aimed at integrating into the development process - helping developers stamp out vulnerabilities early in the process. mark for My Articles similar articles
InternetNews
February 4, 2009
Sean Michael Kerner
IBM AppScan Takes Aim at Securing Flash New application security release tries to secure the latest Web apps, but IBM admits that challenges still remain. mark for My Articles similar articles
InternetNews
June 6, 2007
Clint Boulton
Where There's IBM, There's Watchfire IBM today agreed to buy security and compliance testing software vendor Watchfire for an undisclosed sum. mark for My Articles similar articles
InternetNews
April 16, 2009
Sean Michael Kerner
HP Rolls WebInspect 8.0 for Flash Security HP is expanding its security solutions with new Web 2.0, user behavior and Flash analysis capabilities. This new set of security solutions aims to help enterprises see the big security picture. mark for My Articles similar articles
InternetNews
June 19, 2007
Clint Boulton
HP 'SPIs' Web Application Security HP sets its sights on Web application software maker SPI Dynamics. mark for My Articles similar articles
InternetNews
July 16, 2007
Sean Michael Kerner
Cenzic Takes Competitor Pieces After SPI Dynamics and Watchfire are are acquired by HP and IBM, Cenzic keeps some of each for its own good. mark for My Articles similar articles
CIO
May 15, 2003
Scott Berinato
The Bugs Stop Here Don't blame Microsoft. Don't blame the hackers. Blame yourself for insecure software. Better yet, stop blaming and start moving toward operational excellence. mark for My Articles similar articles
InternetNews
June 16, 2009
Sean Michael Kerner
A New Hailstorm for Application Security As new attacks continue to evolve, Cenzic rolls out new cloud and on-premises offerings. mark for My Articles similar articles
InternetNews
December 3, 2010
IBM Refreshes AppScan to Secure Input Validation New release of AppScan platform - version 8 - from IBM targets cross-site scripting and SAL injection vulnerabilities with string analysis for secure coding. mark for My Articles similar articles
InternetNews
July 31, 2006
Clint Boulton
SQL Injection Threatens to Needle Web Users A scripting flaw that lets perpetrators pull any content from a database is a scary tool for IT admins. mark for My Articles similar articles
InternetNews
March 31, 2008
Sean Michael Kerner
Taking a Wider View of Code Security Fortify's new offering aims to add runtime analysis to its bag of tricks. mark for My Articles similar articles
U.S. Banker
May 2007
Michael Dumiak
Web Risk: Interactive Web Entices, But Is Difficult to Secure Leading financial institutions are trying to balance the marketing and business development possibilities offered by new Web 2.0 functions with the security risks they pose. mark for My Articles similar articles
The Motley Fool
June 20, 2007
Tom Taulli
HP Loads Up on Software The computer maker is making more inroads into the lucrative software space. Investors, take note. mark for My Articles similar articles
InternetNews
August 12, 2005
Jim Wagner
The Return of AJAX? The AJAX style incorporates a number of web standards, including XHTML, XML, XSLT, and DOM. The technique has been used in Google Maps, Amazon's A9 search engine, and Microsoft Outlook Web Access. mark for My Articles similar articles
InternetNews
August 25, 2010
More Security Holes in Software, Fewer Patches According to IBM's X-Force security research group, vulnerabilities are proliferating, and while companies are getting better about reporting those flaws, the number of unpatched problems continues to rise. mark for My Articles similar articles
Bank Technology News
February 2007
Michael Dumiak
Web Risk: A Growing Web's Harder To Secure As Web 2.0 applications and uses become more widespread, it'll be more than the created communities that are vulnerable. The increase of functionality, the richness of sites, creates more vectors for attack. mark for My Articles similar articles
PC Magazine
November 30, 2005
John Clyman
Better Web-App Interfaces with AJAX A new approach to building Web applications promises a richer experience for users. mark for My Articles similar articles
InternetNews
March 2, 2010
IBM Looks to Secure IT From Soup to Nuts At annual RSA security show, IBM unveils enterprise IT security suite that includes products to secure operations from application code all the way through deployment. mark for My Articles similar articles
PC Magazine
December 30, 2003
Matthew D. Sarrel
Network Security: Know Your Weaknesses Vulnerability scanners identify your network's insecurities. Which one of these 6 tested products will watch your back? mark for My Articles similar articles
InternetNews
December 27, 2005
Clint Boulton
Startups Board the AJAX Bandwagon New companies are touting AJAX, thanks to forays from Microsoft and Google. mark for My Articles similar articles
CIO
February 15, 2006
Christopher Lindquist
Ajax Arrives for the Enterprise Ajax is quickly gaining acceptance worldwide as developers look to design Web interfaces that hook users with their speed and ease of use. mark for My Articles similar articles
InternetNews
December 7, 2007
Sean Michael Kerner
Cenzic Virtualizes Security Worried that application vulnerability testing will bust your production environment? Cenzic's new Hailstorm 5.5 software release addresses this issue. mark for My Articles similar articles
InternetNews
October 5, 2006
Andy Patrizio
After The Buzz, Ajax Goes To Work Ajax is an example of the whole being greater than the sum of its parts. And the big developers have all caught the Ajax religion. mark for My Articles similar articles
InternetNews
August 10, 2009
IBM Adds Web App Defense to Security Portfolio IBM today unveiled new enhancements to its security suite aimed at safeguarding Web applications and data, as attacks preying on such targets continue to dominate the headlines. mark for My Articles similar articles