Robuta

https://www.linux.com/news/virtual-machine-introspection-security-innovation-new-commercial-applications/
A few weeks ago, Citrix and Bitdefender launched XenServer 7 and Bitdefender Hypervisor Introspection, which together compose the first commercial application...
virtual machine introspectioncommercial applicationssecurityinnovationnew
https://www.alfasp.com/
file securitydata protectioncomponentsaddapplications
https://cside.com/fr/blog/best-client-side-security-tools-for-web-applications
Web Applications leverage client-side scripts. A multi layer monitoring approach is the best way to detect suspicious activity on those scripts.
client side securityweb applicationsbesttoolsblog
https://nps.edu/web/nps-video-portal/w/new-energy-technologies-and-national-security-applications?p_p_id=com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_XNXPsARpcLEU&p_p_lifecycle=0&p_p_state=normal&p_p_mode=view&assetEntryId=135664689&_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_XNXPsARpcLEU_delta=4&p_r_p_resetCur=false&_com_liferay_asset_publisher_web_portlet_AssetPublisherPortlet_INSTANCE_XNXPsARpcLEU_cur=141
new energynational securityvideo portaltechnologiesapplications
https://www.grayswan.ai/
Gray Swan provides enterprise-grade security solutions for LLMs, developed by the pioneers of AI vulnerability research. Deploy AI with confidence using just...
gray swanenterprise securityai poweredapplications
https://www.surveymonkey.com/r/Y7GJ39M
Take this survey powered by surveymonkey.com. Create your own surveys for free.
asilomar conferenceasmssecurityforensicsapplications
https://zenodo.org/records/4734576
Internet of Things (IoT) technology is a big network of machines, objects, or people interacting together to achieve a common goal. IoT domain has several...
security chainiot securetoolapplications
https://ojp.gov/ncjrs/virtual-library/abstracts/computer-applications-private-security-business-0
computer applicationsprivate securitybusiness officejustice
https://www.sap.com/greece/about/trust-center/security.html
See how SAP Security supports organizations in their transformation journey to becoming an intelligent enterprise by enabling secure business operations in the...
secure datasap securityapplicationscenters
https://www.securityinfowatch.com/video-surveillance/news/12393130/report-market-for-sensors-in-security-and-surveillance-applications-to-nearly-double-by-2023
Frost & Sullivan predicts the market will reach just over $12M by 2023
reportmarketsensorssecuritysurveillance
https://ubuntu.com/blog/enhance-security-of-open-source-applications
Are you spending time on high-impact, high-value activities, or are you constantly derailed by maintenance, support, and deployment challenges? Does your...
open source applicationsenhancesecurityshare
https://www.oracle.com/au/corporate/accessibility/templates/t2-13089.html
oracle fusion applicationsvpatsecurity
https://www.educative.io/courses/build-e-commerce-apps-with-reactive-programming-in-spring-boot/getting-started
Learn how to secure your Spring Boot app using Spring Security with auto-configured login and generated passwords for protection.
spring bootsecurity basicssecuringapplications
https://www.swissbit.com/en/
Swissbit offers perfectly reliable and high-quality flash storage products as well as security solutions for industrial applications. Find out how.
storage solutionsindustrial applicationssecurityswissbit
https://www.tripwire.com/state-of-security/security-threats-facing-llm-applications-and-ways-mitigate-them?ref=hackernoon.com
Learn about top security threats to Large Language Model applications and essential strategies to mitigate risks effectively.
security threatsllm applicationsfacingwaysmitigate
https://www.elastic.co/docs/reference/search-connectors/es-dls-e2e-guide
This guide explains how to ensure document-level security (DLS) for documents ingested by Elastic connectors, when building a search application. In this...
search applicationsleveragedocumentlevelsecurity
https://www.helpnetsecurity.com/2013/12/10/using-firewall-rules-to-migrate-business-applications-to-a-private-cloud/
An increasing number of organizations are already taking advantage or planning to take advantage of the many financial and operational benefits that a
business applicationsusingfirewallrulesmigrate
https://www.getpreempt.com/index.html
preemptaisecuritystandardapplications
https://www.sans.org/webcasts/deep-dive-building-security-applications-generative-ai
In this talk, Ahmed Abugharbia and Abdul Kittana will deep dive into various methodologies and options for developing applications using generative AI...
deep divebuilding securitygenerative aisans instituteapplications
https://www.sintef.no/en/publications/publication/2398606/
critical infrastructureot securitydefendingpracticalsbom
https://www.helpnetsecurity.com/2018/10/17/protect-applications-malicious-scripts/
The solution to preventing these kinds of attacks is to avoid giving client applications, such as web browsers, bad code to run in the first place.
help net securityprotectingapplicationsmaliciousscripts
https://www.securityinfowatch.com/perimeter-security/physical-hardening/press-release/10489287/smart-fuel-cell-ag-sfc-introduces-new-fuel-cell-for-remote-security-applications
Maintenance-free methanol-based system provides 24/7 power in all weather conditions
fuel cellremote securitysfcintroducesnew
https://www.oracle.com/nl/corporate/accessibility/templates/t2-8016.html
oracle fusion applicationsvpatsecurity
https://deepai.org/publication/enhancing-data-security-for-cloud-computing-applications-through-distributed-blockchain-based-sdn-architecture-in-iot-networks
11/28/22 - Blockchain (BC) and Software Defined Networking (SDN) are some of the most prominent emerging technologies in recent research. The...
data securitycloud computingenhancingapplicationsdistributed
https://www.alibabacloud.com/en/product/security?_p_lc=1&spm=a3c0i.7911826.6791778070.94.188f2224U03Jq6
Alibaba Cloud security services protect your business, operations, network, application, cloud server and infrastructure with threat detection, DDoS defense,...
cloud securitybusiness operationsnetwork applicationssecuresalibaba
https://www.securitymagazine.com/articles/78380-support-for-large-multi-site-applications-1
Milestone Systems has come up with an open platform IP video software. Based on .net technology, this software is useful for applications in large security...
multi siteapplications securitysupportlargemagazine
https://www.microfocus.com/documentation/silk-test/200/en/silktestworkbench-help-en/SILKTEST-0B577EBB-CONFIGURINGAPPSTOREPLAYCLICKMETHODS-TSK.html
When you play back tests that use Adobe Flash Player, unexpected results occur when high-level clicks are used in certain situations.
adobe flash playerconfiguringflexapplicationssecurity
https://www.oracle.com/africa/corporate/accessibility/templates/t2-13089.html
oracle fusion applicationsvpatsecurity
https://www.preprints.org/manuscript/202502.1011
This study examines the security implications of generative artificial intelligence (GAI), focusing on models such as ChatGPT. As GAI technologies are...
text miningresearch trendsapproachesexploringsecurity
https://www.businesswire.com/news/home/20221024005270/en/Intel-Foundry-Services-Forms-Alliance-to-Enable-National-Security-Government-Applications
IFS USMAG Alliance combines a trusted design ecosystem with U.S.-based manufacturing to enable assured chip design and production at leading nodes.
intel foundry servicesnational securityformsallianceenable
https://community.f5.com/kb/technicalarticles/increase-security-in-aws-without-rearchitecting-your-applications---part-1-tuesd/306222
It is a random Tuesday, and your boss just left an urgent meeting with the executives. The board has become concerned about the security of your IT...
increase securityawswithoutapplicationspart
https://docs.oracle.com/en/cloud/saas/netsuite/ns-online-help/chapter_1534781311.html
NetSuite Applications Suite
user securitynetsuiteapplicationsongoing
https://www.nist.gov/publications/pressure-sensitive-sampling-wands-homeland-security-applications
This work discusses the use of Force Sensing Resistor (FSR) technology for Homeland Security applications.
pressure sensitivehomeland securitysamplingwandsapplications
https://safet.com/
Develop Apps with High Regulatory Requirements. Our software stack ensures your technology follows the security and procedures necessary for compliance.Sa
far lessincreased securitysafetapplicationstime
https://www.omnilert.com/blog/what-are-access-control-systems
Nov 25, 2025 - Learn what are access control systems, how they work, and the types available. Explore key components, modern technologies, and the benefits of implementing...
access control systemstypesbenefitsampmodern
https://spin.ai/
Mar 4, 2026 - Enhance cyber resilience, security operations, and cost efficiency with an all-in-one SaaS security platform that protects your SaaS data from loss,...
saas securitymission criticalapplicationsspinai
https://snyk.io/articles/cloud-native-security-for-cloud-native-applications/
Cloud native Security is the practice of securing cloud-based platforms, infrastructure and applications by building in security throughout the development...
cloud native securitysecure applicationssnyk
https://aws.amazon.com/marketplace/pp/prodview-unmm2bdrqh5so
Companies and institutions are increasingly developing or purchasing AI applications & services for enterprise usage. However, one of the main concerns related...
aws marketplacesecurity reviewai applicationsservices
https://patriotemployees.com/
All Patriot Security EOC Employee Web Applications
employee sitepatriotsecurityeoc
https://wisa.or.kr/
world conferenceinformation securitywisaapplications
https://www.helpnetsecurity.com/2018/06/29/vulnerability-landscape-evolution/
Flexera released Vulnerability Review 2018: Top Desktop Apps. This edition focuses on desktop applications, which can be breached through the Internet.
help net securitydesktop applicationsvulnerabilitylandscapeevolution
https://www.nokia.com/bell-labs/publications-and-media/publications/configuring-networks-with-content-filtering-nodes-with-applications-to-network-security/
In this paper we study the impact of the content filtering nodes in the network. Next, given a set of deployed content filtering nodes, we develop a fully...
content filteringconfiguringnetworksnodesapplications
https://www.sans.org/cyber-security-courses/application-security-securing-web-apps-api-microservices
Gain the skills you need to understand and mitigate vulnerabilities and secure web applications, APIs, and microservices.
application securityweb applicationssecuringapismicroservices
https://www.hcltech.com/de-de/blogs/checkpoints-for-mobile-applications-security
This blog provides practical recommendations for businesses to enhance mobile application security to prevent data breaches, legal compliance, and reputational...
mobile applicationscheckpointssecurityhcltechgermany
https://www.helpnetsecurity.com/2022/05/25/oracle-cloud-infrastructure/
Oracle is expanding the built-in security services and capabilities of Oracle Cloud Infrastructure to help customers protect their data.
cloud securityoracleexpandscapabilitieshelp
https://www.bizionictech.com/security/solutions/app/application-security-aws
Ensure the security of your AWS applications with Bizionic’s advanced solutions. Strengthen your defenses and protect your cloud assets today!
advanced securityawsapplications
https://webinars.techstronglearning.com/implementing-security-best-practices-for-serverless-applications
In this session, we explore how to implement security best practices across the software delivery lifecycle and into production deployment.
security best practicesserverless applicationsimplementing
https://www.fortra.com/blog/cloud-workload-security-best-practices-safeguarding-applications
The cloud has become the de facto platform for app deployment, making cloud resources a target for malicious agents and a priority for data protection....
cloud workload securitybest practicessafeguardingapplicationsfortra
https://www.helpnetsecurity.com/2024/02/27/spinspm-for-salesforce-identifies-misconfigurations-within-saas-applications/
SpinSPM for Salesforce gives organizations complete visibility into their SaaS application configuration
saas applicationssalesforceidentifieswithinhelp
https://www.information-age.com/outdated-applications-security-10699/
A large proportion of IT decision makers in the UK admit to continuing to use outdated applications despite knowing it's security concerns.
chiefsadmitusingoutdatedapplications
https://cloudflare.tv/this-week-in-net/2024-security-week-edition-ai-networks-applications-and-more/4ZDVb2vB
In this week's episode, we have a special edition all about Cloudflare’s first innovation week of the year, Security Week. João Tomé and...
security weekai networkseditionapplicationscloudflare
https://www.nextgov.com/artificial-intelligence/2023/08/tech-officials-caution-data-security-public-sector-ai-applications/389077/
A group of tech policy leads across federal agencies discussed the current and future state of play of artificial intelligence in government systems.
data securitypublic sectortechofficialscaution
https://hackernoon.com/the-ministry-of-defence-is-exploring-applications-for-quantum-technology-in-national-security
Jul 18, 2022 - In this thread, our community discusses quantum computers and their impactful uses.
quantum technologyministrydefenceexploringapplications
https://www.manageengine.com/products/applications_manager/security-updates/security-updates-cve-2016-9488.html
This page details security vulnerability fixes made in various releases of Applications Manager.
security updatesapplications managercvedetailsmanageengine
https://elie.net/publication/spotlight-malware-lead-generation-at-scale
We present Spotlight, a large-scale malware lead-generation framework that uses deep-learning to clusters malware famillies to isolate potentially-undiscovered...
lead generationspotlightmalwarescaleproceedings
https://jewishpress.com/tag/security-applications/
security applicationsjewish pressarchivescom
https://benchmarkmagazine.com/exploring-critical-ai-applications-at-cni-security-group-day/
The CNI Security Group will host its next event, Is AI the Future of Security?, on Wednesday, 26 February, at Guildhall London. Starting at 10:00 am, the event...
ai applicationssecurity groupexploringcriticalcni
https://www.goodreads.com/author/show/1341031.Konstantinos_Markantonakis
Konstantinos Markantonakis is the author of Smart Cards, Tokens, Security and Applications (4.25 avg rating, 4 ratings, 1 review, published 2008), Secure...
smart cardskonstantinoseditortokenssecurity
https://spin.ai
Enhance cyber resilience, security operations, and cost efficiency with an all-in-one SaaS security platform that protects your SaaS data from loss,...
saas securitymission criticalapplicationsspinai
https://www.atlantis-press.com/journals/ijcis/25868023
security applicationsrecentadvancesintelligencetechnology
https://evo.ai.snyk.io/
Evo by Snyk protects AI native apps from new threats by orchestrating a team of AI agents to empower your security engineers
agentic aisecurityapplicationstoolsevo
https://www.helpnetsecurity.com/2012/02/16/the-internet-of-things-key-applications-and-protocols/
The Internet of Things describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP
key applicationsinternetthingsprotocolshelp
https://www.osce.org/secretariat/564758
The OSCE Secretariat is organizing two events in Tbilisi for young people from Central Asia and the South Caucasus: an OSCE School, followed by a Mode...
conference organizationcallapplicationsosceschool
https://easychair.org/publications/preprint/Sk8R
layered securitycelscrystallineencryptionextension
https://www.pandasecurity.com/en/mediacenter/what-is-digital-security/
Feb 20, 2024 - Digital security refers to the protective measures individuals and organizations take to defend their personal and professional information online.
digital securitytoolsapplicationspandamediacenter
https://www.helpnetsecurity.com/2014/06/23/quarter-of-all-uk-attacks-target-web-services-and-applications/
A comprehensive analysis of security alerts in 2013 reveals that a quarter of all attacks in the UK were application specific attacks or targeted at web
web servicesquarterukattackstarget
https://github.com/symfony/acl-bundle
Integrates the ACL Security component into Symfony applications. - symfony/acl-bundle
githubsymfonyaclbundleintegrates
https://www.securityinfowatch.com/access-identity/access-control/press-release/10556612/johnson-controls-security-products-formerly-tyco-security-products-sur-gard-system-ii-receiver-for-proprietary-applications
Receiver provides remote IP monitoring of commercial fire and burglary systems
system iiproprietary applicationssecurity infosurgard
https://www.tum.de/en/news-and-events/all-news/press-releases/details/34753
The start-up Crashtest Security develops software for automatic detection of vulnerabilities in web applications. The company, originally established by...
security vulnerabilitiesnetwork applicationsautomaticdetectiontum
https://reforms-investments.ec.europa.eu/projects/5g-demonstrative-applications-development-urban-security-and-situation-management-bilina-support-5g_en
This project focuses on the municipal camera and surveillance system, where it is planned to expand it and to put into operation at least 15 points of the...
applications developmenturban securitydemonstrativesituationmanagement
https://www.helpnetsecurity.com/2013/08/28/shielding-targeted-applications/
When we discuss exploit prevention, we often talk about "targeted applications.' This term refers to end-user applications which can be exploited by
help net securityshieldingtargetedapplications
https://www.f5.com/company/blog/how-componentization-of-applications-impacts-performance-and-security
Componentization is great for development and certainly aids in speeding up time to value. But it can have a negative impact on performance - and security.
applicationsimpactsperformancesecurity
https://www.securitymagazine.com/articles/98764-wave-2-video-analytics-and-their-security-applications
The second wave of video analytics can help security teams leverage video surveillance to protect their facilities by providing context to alerts.
video analyticssecurity applicationswavemagazine
https://www.cloud-awards.com/cloud-security-awards/best-security-solution-for-virtual-application-virtual-desktops/
Dec 10, 2025
security solutionvirtualapplicationsawardcloud
https://www.simplilearn.com/what-is-digital-security-article
What type of information is a digital security risk? As digital security helps protect online identity, learn its importance, various tools, & more. Read on!
digital securityoverviewtypesapplicationsexplained
https://www.pearson.com/en-au/subject-catalog/p/network-security-essentials-applications-and-standards-global-edition/P200000005476/9781292154916
network securityglobal editionessentialsapplicationsstandards
https://www.alibabacloud.com/en/product/security?_p_lc=1
Alibaba Cloud security services protect your business, operations, network, application, cloud server and infrastructure with threat detection, DDoS defense,...
cloud securitybusiness operationssecuresnetworkamp
https://fidoalliance.org/fido2-enhancements/?query-cdbd12d0-page=69
By David Turner, Director of Standards Development, FIDO Alliance
security applicationsfido allianceenhancementsenterprisecomplex
https://www.nationalacademies.org/projects/DBASSE-BBCSS-17-02/event/9650
decadal surveybehavioral sciencessocialapplications
https://www.acsac.org/2023/
computer securityannualapplicationsconferenceacsac
https://www.hcl-software.com/appscan/marketplace
Application security testing with HCL AppScan. Enjoy exclusive year-end discounts on DAST, SAST, and SCA scans starting at $29.99. Compare plans and start a...
year endapplications securitylimited offerdealstesting
https://www.radware.com/products/appwall-resources/?type=White%20Papers
AppWall is used for Web applications security and PCI compliance. Read AppWall white papers, case studies and find related products
web applicationssecurityresourcesradware
https://www.securitymagazine.com/articles/97078-securing-mobile-applications-with-blockchain-technology
Blockchain can help cybersecurity professionals looking to secure mobile applications with its transparency, decentralization and the encryption it provides.
securing mobile applicationsblockchain technologysecurity magazine
https://www.securityinfowatch.com/home/event/10479078/physical-security-introductory-applications-and-technology
This comprehensive program on physical security - the first of a fourpart series - provides an essential foundation relevant to all security practitioners and...
physical securitytechnology infointroductoryapplicationswatch
https://www.eschoolnews.com/district-management/2010/03/23/schools-beef-up-security-for-web-applications/?Innovationnewsletter23
Technology News & Innovation in K-12 Education
web applicationsschoolsbeefsecurity
https://www.acsac.org/
The Annual Computer Security Applications Conference (ACSAC) brings together cutting-edge researchers, with a broad cross-section of security professionals...
computer securityannualapplicationsconferenceacsac
https://www.c-sharpcorner.com/article/application-security-best-practices-for-developers-in-c-sharp-applications/?utm_source=dotnetnews.beehiiv.com&utm_medium=referral&utm_campaign=the-net-news-daily-issue-276
Enhance C# application security! Learn best practices for authentication, authorization, data protection, and more. Secure your ASP.NET Core apps now!
security best practicesapplicationdevelopers
https://www.helpnetsecurity.com/2023/04/13/cloudcasa-for-velero-manages-and-protects-kubernetes-applications/
CloudCasa for Velero gives enterprises the ability to scale their business with multi-cluster management for Velero backups.
veleromanagesprotectskubernetesapplications
https://www.mdpi.com/2227-7080/13/5/176
The prospect of integrating every object under a unified infrastructure, which provides humans with the possibility to monitor, access, and control objects and...
data drivenlearning modelsinternetthingssecurity
https://www.sap.com/hungary/about/trust-center/security.html
See how SAP Security supports organizations in their transformation journey to becoming an intelligent enterprise by enabling secure business operations in the...
secure datasap securityapplicationscenters