Automating cloud security is a complex process that often fails to achieve the desired results. Achieving automation starts with understanding what you want out of
Month: November 2021

Compliance with Sarbox, GLBA, HIPAA and a number of other regulations has become a key driver behind information security decision making. This does not necessarily

The Messaging Anti-Abuse Working Group (MAAWG) and the Anti-Phishing Working Group (APWG) have published Anti-Phishing Best Practices for ISPs and Mailbox Providers. The report characterizes phishing messsages and makes recommendations

At about the same time Oracle is releasing its quarterly patch, Sun is announcing MySQL 5.1, a major upgrade that brings more standard relational DBMS

Languages that provide evaluation functions (‘eval’) are nothing new and programs that manipulate program code as if it were data are nothing new either. They

The first thing a seasoned application developer does when starting a project is to get a handle on the scope and learn the requirements. It