Tags » IT Security

The Heartbleed Can't Stop Bleeding

Does it really have to be this way? Once you get a visit of a serious cyber threat, you always have to be on alert. Why can we do it this way? 205 more words

Nuclear Cyber Attack

Can you imagine something like this? The US Nuclear Regulatory Commission itself has been targeted by hackers three times in the last three years. So, what are we supposed to say or think about this information? 182 more words

Q3 Ingram Micro & Top Manufacturer Promotions!

Ingram Micro brings you savings on the latest products and solutions from our top manufacturer partners. Here are this quarter’s (Q3) rebates and promotions (click on links to access the promotional flyers): 255 more words

IT Security

Hacking The Bottom Line

Editor’s note: Andre Durand is the founder and CEO of Ping Identity.

Where is your data, and how quickly can you safely reach it? 1,243 more words


Facebook Inaugural Internet Defense Award

Finally, someone has realized that there is no such a thing as a bad investment in IT security. Finally, some positive news from the Facebook’s kitchen after the troubling series of events associated with the privacy controversies. 169 more words

IT-Security (Part 7): WebLogic Server, Roles, Role Mapping and Configuring a Role Mapping Provider by Mohammad Esad-Djou

Let’s continue with Authorization topic. We discussed about the Authorization Process and its main components such as WebLogic Security Framework and Security Provider. Now, we look at Security Provider’s subcomponents: Role Mapping and Security Policies. 242 more words