glitch
|
Why Target Needs a Secure, Trusted Application Base Target’s well-publicized disclosure that customers’ personally identifiable information (PII) had been compromised is the latest software “glitch” that is getting a fair amount of attention. Read on if you would like to know how to secure your systems without having to rely upon security scans that only detect the presence of a problem after it is already on your server.
|
|
|
Securing the Trusted Application Base Corporations, government agencies, and other institutions need to embrace industry best practices that have been proven to help develop and implement reliable systems. One of the most important considerations is the need for a secure, trusted application base. This article will help you get started delivering systems that can be verified and supported while continuously being updated as needed.
|
|
|
Combating Learned Complacency to Reduce Systems Glitches Leslie Sachs writes on how employees in many companies have essentially learned to no longer raise their concerns because there is no one willing to listen, and—even worse—they may have suffered consequences in the past for being the bearer of bad tidings. Leslie refers to this phenomenon as learned complacency.
|
|
Visit Our Other Communities
CMCrossroads is a TechWell community.
Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.