Login | Register   
RSS Feed
Download our iPhone app
Browse DevX
Sign up for e-mail newsletters from DevX


Security Zone

February 26, 2014
This tutorial explians how to use the REST API and OAuth together in order to create a secure web service.


February 24, 2014
Delegate control of each Internet of Things node locally to the node itself.
February 10, 2014
We’ll need more than a handful of leaders showing the impressionable masses the way to the light.
January 31, 2014
According to the <em>Symantec Internet Security Threat Report for 2013</em>, web-based attacks compromised more than 93 million identities last year. Now, more than ever, is a good time to pay more attention to properly securing your website. Explore these tips and techniques that will make your site a tougher target for attackers.
January 7, 2014
Companies often understand that AD FS is the right tool to create a secure network for managing resource requests from both internal and external users, but fail to position it in a reliable fashion. In my first post today, I will explain a set of generic guidelines to help you optimally configure AD FS in your farm environment.
December 19, 2013
Kaseya will have a true “Cloud on the device” that I believe is the future of BYOD.
December 12, 2013
Given the recent row in the usually staid Public Key Infrastructure (PKI) world, when the Government of France was caught red-handed with forged SSL certificates, can we trust PKI at all anymore?
November 20, 2013
Verizon’s Managed Certificate Services are a good starting point, but there’s much more work to be done as there's no new technology here.
November 19, 2013
Neither Salesforce nor anyone else really has a clue how to secure the IoT.
September 23, 2013
Who should we blame if we don’t like what the NSA has been up to? Congress.
September 10, 2013
There’s no place to hide. There are no more secrets.
August 15, 2013
It’s not a technology problem. It’s a governance and public policy problem.
August 13, 2013
If you believe that Bitcoin is good for anything other than paying hackers to find weaknesses, then you’re in for a rude awakening.
August 8, 2013
Don’t count on this simple technique to mitigate the insider risk
July 23, 2013
Nobody is 100% trustworthy.
July 9, 2013
For perfect cybersecurity, disconnect your systems, put them in a locked room, and throw away the key.
June 7, 2013
Headline: National Security Agency Caught Unawares by Cyberattack
May 15, 2013
Want Cybersecurity? Get Cloud. That’s the perspective of General Keith Alexander, director of the National Security Agency and commander of the U.S. Cyber Command.
May 12, 2013
Would anybody in your organization click a benign link to a news article, and then provide login credentials?
April 26, 2013
The increasingly trusted Twitter service is one more front in the global Cyberwar we're woefully unprepared to defend.