October 30, 2014
POODLE means finally getting rid of IE 6 once and for all.
September 30, 2014
Learn more about the different steps and tools employed to protect Big Data applications.
September 1, 2014
Learn more about ZAP—a penetration test and vulnerability assessment tool written in Java.
August 12, 2014
Will the Internet of Things wither on the vine?
August 7, 2014
Development project failures and the subsequent re-work are well-known issues. Learn more about how the Cost of Poor Quality (CoPQ) is largely a controllable entity.
July 2, 2014
The final installment in this tutorial series will show you how to secure, store and display the video surveillance data.
June 5, 2014
Learn how to read the video stream you set up in the first part of this tutorial and accept it at the remote location.
May 6, 2014
This article presents a programmatic solution to the problem based on adding permissions to the files.
May 5, 2014
Some policies must be enforced across organizational and technical silos.
April 29, 2014
Learn how to configure the client machine (the one to which the camera is attached), to read the stream from your camera and make it accessible from a remote location via network or internet.
February 26, 2014
This tutorial explians how to use the REST API and OAuth together in order to create a secure web service.
February 24, 2014
Delegate control of each Internet of Things node locally to the node itself.
February 10, 2014
We’ll need more than a handful of leaders showing the impressionable masses the way to the light.
January 31, 2014
According to the <em>Symantec Internet Security Threat Report for 2013</em>, web-based attacks compromised more than 93 million identities last year. Now, more than ever, is a good time to pay more attention to properly securing your website. Explore these tips and techniques that will make your site a tougher target for attackers.
January 7, 2014
Companies often understand that AD FS is the right tool to create a secure network for managing resource requests from both internal and external users, but fail to position it in a reliable fashion. In my first post today, I will explain a set of generic guidelines to help you optimally configure AD FS in your farm environment.