Hewlett-Packard (HP) Co. last week signed a definitive agreement to buy TruLogica, a Dallas-based provider of identity management software. HP plans to integrate the privately owned company's ID management technology into its OpenView Select Access software to form "a complete federated identity management offering."
Windows XP Service Pack 2 is coming. Are you ready to rewrite your
applications...again?
Web application security software vendor Sanctum Inc., Santa Clara, Calif., has announced a partnership with Sunnyvale, Calif.-based Mercury Interactive Corp. to integrate security testing tools into the QA environment.
Microsoft is offering a bounty for writers of malicious code. Maybe they should
take some of that money and spend it internally.
Announcement of new support for Web services security across IBM's WebSphere infrastructure and Tivoli identity management middleware.
New versions of three products address data availability, accountability and integrity without having to write additional code.
Launch of BEA WebLogic Enterprise Security (WLES) first new product resulting from February acquisition of CrossLogix.
Analysis of the recent wave of virus attacks.
Ponder the security challenges posed by Web services, how to address them with security architecture, and what security architecture can offer going forward when XML traverses firewalls.
For many reasons, enterprise application security is an inefficient and expensive model. Obviously there''s no such thing as a completely secure application, but enterprises must target an acceptable level of risk.
New standards rolled out at the Catalyst conference.
Company says content management, not content blocking, is the future.
A cornerstone of Web services, the WSDL spec continues to evolve; experts hope upcoming versions can bring it to a new level; a look at today’s WSDL tools.
Crafting a map of your database servers can help you build better systems, from increased security to solid disaster-recovery plans. Take these steps to get your server network in order.
Venerable security takes on high-tech crime.
Database maker adds security function to its BI software.
Company offers new way to use its security product, and unveils a defense against attacks from inside and out.
We recently asked security maven Steve Orrin to tell us some of the tenets of secure coding today.
Maker of compression utility adds features to flagship product.