This is the second installment of a three-part article examining techniques used to architect secure Web services. Part one introduced a fictional company, The Internet Dictionary Company (TIDC) and ...
A number of unmet security needs remain, including nonrepudiation for transactions, securing credentials, use of covert channels to access services, use of SOAP to distribute malicious code, denial-of ...
ZÜRICH--(BUSINESS WIRE)--Open Systems, the leading Secure Access Experience solution, today announced the general availability of its Secure Web Gateway as a Service offering. Open Systems Secure Web ...
As I mentioned in previous columns, there’s a new set of draft documents from the Computer Security Resource Center (CSRC) of the U.S. National Institute of Standards and Technology (NIST). SP 800-95, ...
Many Web-based services, from shopping to online word processing, allow computer programs to talk to each other and exchange user data across several Web sites without human intervention. Many of the ...
DataPower Technology Inc. last week joined a small but growing number of IT vendors offering products aimed at securing XML-based Web services applications. The Cambridge, Mass.-based company’s XS40 ...
eSpeaks’ Corey Noles talks with Rob Israch, President of Tipalti, about what it means to lead with Global-First Finance and how companies can build scalable, compliant operations in an increasingly ...
WEB SERVICES ARE primed to be the next big development for Internet-based applications and transactions. As with any new technology, security eventually surfaces in the discussion — and Web services ...