Login | Register   
Twitter
RSS Feed
Download our iPhone app
TODAY'S HEADLINES  |   ARTICLE ARCHIVE  |   FORUMS  |   TIP BANK
Browse DevX
Sign up for e-mail newsletters from DevX


advertisement

Security Zone

FEATURED ARTICLE
September 1, 2014
Learn more about ZAP—a penetration test and vulnerability assessment tool written in Java.

NEWEST ARTICLES

August 12, 2014
Will the Internet of Things wither on the vine?
August 7, 2014
Development project failures and the subsequent re-work are well-known issues. Learn more about how the Cost of Poor Quality (CoPQ) is largely a controllable entity.
July 2, 2014
The final installment in this tutorial series will show you how to secure, store and display the video surveillance data.
June 5, 2014
Learn how to read the video stream you set up in the first part of this tutorial and accept it at the remote location.
May 6, 2014
This article presents a programmatic solution to the problem based on adding permissions to the files.
May 5, 2014
Some policies must be enforced across organizational and technical silos.
April 29, 2014
Learn how to configure the client machine (the one to which the camera is attached), to read the stream from your camera and make it accessible from a remote location via network or internet.
February 26, 2014
This tutorial explians how to use the REST API and OAuth together in order to create a secure web service.
February 24, 2014
Delegate control of each Internet of Things node locally to the node itself.
February 10, 2014
We’ll need more than a handful of leaders showing the impressionable masses the way to the light.
January 31, 2014
According to the <em>Symantec Internet Security Threat Report for 2013</em>, web-based attacks compromised more than 93 million identities last year. Now, more than ever, is a good time to pay more attention to properly securing your website. Explore these tips and techniques that will make your site a tougher target for attackers.
January 7, 2014
Companies often understand that AD FS is the right tool to create a secure network for managing resource requests from both internal and external users, but fail to position it in a reliable fashion. In my first post today, I will explain a set of generic guidelines to help you optimally configure AD FS in your farm environment.
December 19, 2013
Kaseya will have a true “Cloud on the device” that I believe is the future of BYOD.
December 12, 2013
Given the recent row in the usually staid Public Key Infrastructure (PKI) world, when the Government of France was caught red-handed with forged SSL certificates, can we trust PKI at all anymore?
November 20, 2013
Verizon’s Managed Certificate Services are a good starting point, but there’s much more work to be done as there's no new technology here.
November 19, 2013
Neither Salesforce nor anyone else really has a clue how to secure the IoT.
September 23, 2013
Who should we blame if we don’t like what the NSA has been up to? Congress.
Sitemap