Your browser does not support JavaScript or it may be disabled!
rediff.com
 India As It Happens
Rediff Labs will showcase innovative products that rediff is working on behind the scenes.
News   |   Images
NEWS ON MOBILE
Get Realtime News
on your webpage

About 42 results for "chris wysopal"

Co-Founder and CTO of Veracode will participate in three discu...

Release date- 18022014 - BURLINGTON, Mass. - Veracode, Inc. , the application security company, today announced that Chris Wysopal , co-founder and CTO, Veracode will present during three sessions at the RSA Conference in San Francisco . Chris ... HispanicBusiness.com, 1 month ago

1 images for "chris wysopal"

Recode, 4 weeks ago

It may be ILLEGAL to run Heartbleed health checks IT lawyer

High performance access to file storage Websites and tools that have sprung up to check whether servers are vulnerable to OpenSSL's mega-vulnerability Heartbleed have thrown up anomalies in computer crime law on both sides of the Atlantic. Both ...
 The Register4 days ago
CEOWorld Magazine

Top Chief Security Officers (CSOs) to Follow on Twitter

Since we published the list of top charity CEOs , advertising executives , influential chief executive officers (CEOs ,) venture capitalists , chief marketing officers (CMOs ,) and chief information officers (CIOs) the role of the Chief Security ...
 CEOWorld Magazine1 week ago

A 'cloud first' strategy calls for strong security: Five tips

Security is still a major obstacle for IT when it comes to cloud adoption. That was made crystal clear at the Massachusetts Technology Leadership Council seminar on securing data, availability and reputation in the cloud , which attracted a mix of ...
 SearchCIO.com2 weeks ago

Dimwit hackers use security camera DVRs as SUPER-SLOW Bitcoin-mining rig

High performance access to file storage Miscreants are using hacked digital video recorders in a somewhat misguided attempt to mine cryptocurrency BitCoins. Hackers have created custom code to infect devices normally used for recording footage ...
 The Register1 week ago Hackers Use Security Camera DVRs As Bitcoin Mining Rig  Packet Storm1 week ago
Network World Asia

Why Software Testing Can't Save You From IT Disasters

On the day of Facebook's IPO, a concurrency bug that lay hidden in the code used by Nasdaq suddenly reared its ugly head. A race condition prevented the delivery of order confirmations, so those orders were re-submitted repeatedly. UBS, which ...
 Computerworld Norge1 month ago
[x]  
Barchart

TREND MICRO INCORPORATED : UBM Tech - InformationWeek and Dark Reading present SECURITY

Release date- 06032014 - BOSTON - UBM Tech's Dark Reading and InformationWeek, the leading technology media brands focused on serving both IT security and business leaders, along with Trend Micro , invite to join us to discuss the important topic of ...
 4 Traders1 month ago InformationWeek and Dark Reading present SECURITY  Barchart1 month ago UBM Tech - InformationWeek and Dark Reading present SECURITY  TMC Net1 month ago
[x]  

Securing Software Requires Design, Testing, And Improvement

Software makers need to adopt secure development methodologies and make their process more transparent to assure customers that security is a shared goal, experts told attendees at the RSA Conference in San Francisco last week. More Security ...
 Dark Reading1 month ago Veracode Launches Software Composition Analysis Service  Dark Reading1 month ago Veracode Accelerates Secure Software Development with Third-Party Component Analysis  4 Traders1 month ago
[x]  

Anti-snoop Blackphone hits shelves in June: NOW we'll see how much you value privacy

Evaluating the cost of a DDoS attack The launch of the privacy-focused Blackphone attracted plenty of attention at Mobile World Congress last week, but security experts are already warning privacy-conscious potential users not to get too carried ...
 The Register1 month ago
SC Magazine UK

RSA 2014: The "double-edged sword" of disclosing software vulnerabilities

An interesting discussion at the RSA conference revealed that vendors often face a "double-edged sword" when tasked with disclosing software vulnerabilities. A panel comprising Nadya Bartol - senior cyber-security strategist at the Utilities Telecom ...
 SC Magazine UK1 month ago The "double-edged sword" of disclosing software vulnerabilities  SC Magazine US1 month ago
Prev | Next
Personalize your Realtimeclose [x]
Add content to your personalized tab - My News
Add upto 6 topics of your interest:
for eg.2g Scam , World
1.
2.
3.
4.
5.
6.
Personalize the tabs display. ( You can add or remove the tabs )
AlertsGet updates on latest news & your favourite topics right in your inbox.Set an Alert|Manage your Alerts

Get

Realtime News

on your Webpage

Add Widget >Get your members hooked!
    
Alerts
Get updated on latest news & your favorite topics right in your inbox!
 
More     Less