glitch

Articles

Trusted Application Base Why Target Needs a Secure, Trusted Application Base

Target’s well-publicized disclosure that customers’ personally identifiable information (PII) had been compromised is the latest software “glitch” that is getting a fair amount of attention. Read on if you would like to know how to secure your systems without having to rely upon security scans that only detect the presence of a problem after it is already on your server.

Bob Aiello's picture Bob Aiello
Securing the Trusted Application Base Securing the Trusted Application Base

Corporations, government agencies, and other institutions need to embrace industry best practices that have been proven to help develop and implement reliable systems. One of the most important considerations is the need for a secure, trusted application base. This article will help you get started delivering systems that can be verified and supported while continuously being updated as needed.

Bob Aiello's picture Bob Aiello
Combating Learned Complacency to Reduce Systems Glitches Combating Learned Complacency to Reduce Systems Glitches

Leslie Sachs writes on how employees in many companies have essentially learned to no longer raise their concerns because there is no one willing to listen, and—even worse—they may have suffered consequences in the past for being the bearer of bad tidings. Leslie refers to this phenomenon as learned complacency.

Leslie  Sachs's picture Leslie Sachs

CMCrossroads is a TechWell community.

Through conferences, training, consulting, and online resources, TechWell helps you develop and deliver great software every day.