Web App Security
Advancing the Usability of PKIs
February 06, 2018 Added by:Dan Timpson
If your organization is going to rely on PKI, it’s important to also leverage the benefits that automation can provide.
Comments (0)
Increasing Importance of Mobile Makes Malware a Priority
January 17, 2018 Added by:Asma Zubair
Businesses should fortify their high value apps with additional security precautions from the inside out.
Comments (0)
The 5 Motives of Ransomware
January 04, 2018 Added by:Joseph Carson
Who would have foreseen the impact of both WannaCry and NotPetya
Comments (0)
Shadow IT: The Invisible Network
November 14, 2017 Added by:Chris Jordan
Shadow IT is the term most related to the risk associated with the threat that application awareness addresses.
Comments (0)
The Evolution from Waterfall to DevOps to DevSecOps and Continuous Security
November 03, 2017 Added by:Jonathan Bregman
The evolution of application development and the need for automated and continuous security, monitoring and incident response through the application lifecycle and beyond deployment.
Comments (0)
Oracle CPU Preview: What to Expect in the October 2017 Critical Patch Update
October 17, 2017 Added by:James E. Lee
In a pre-release statement, Oracle has revealed that the October Critical Patch Update (CPU) is likely to see nearly two dozen fixes to Java SE, the most common language used for web applications.
Comments (0)
Hey Alexa – Show Me Whitelisted Malware
October 10, 2017 Added by:Troy Kent
The team at Awake Security recently took a closer look at one seemingly benign list – the Alexa Top 1 Million list of domains – to assess whether it would be safe to use for whitelisting.
Comments (0)
The Weakest Link In Banking Security – ATMs
October 03, 2017 Added by:Vanishree Rao
We have recently seen the weak link theory play out with the very familiar Automated Teller Machines (ATMs) that are used regularly around the globe.
Comments (0)
No Such Thing as Too Small to Hack
September 07, 2017 Added by:Avi Bartov
Technology alone does not equal security, as owners and employees must begin to realize that their websites offer a potentially immense value proposition to hackers. An SMB is definitely not too small to care.
Comments (0)
Understanding Hacker Mindset Key for Website Security, Business Resilience
August 01, 2017 Added by:Avi Bartov
The traditional perimeter solutions are losing their effectiveness since hackers place more value in motive opportunities than they ever have previously.
Comments (0)
How to Prevent Ransomware and Cyberattacks
July 14, 2017 Added by:Steven Minsky
The impacts of ransomware and other breaches that exploit failures in risk management are preventable. An attack can come at any time, and failing to implement a strong prevention strategy is a recipe for disaster.
Comments (0)
Follow the Money — Stemming Hacker Habits
June 30, 2017 Added by:Steve McGregory
Cybercriminals aren’t stopping anytime soon. Ensure you have a finger on the pulse of your network or be ready to become another notch on a hacker’s belt.
Comments (0)
The Upcoming Oracle CPU: Struggling to Keep Pace with Vulnerabilities
June 28, 2017 Added by:James E. Lee
Oracle's April 2017 update was its largest CPU to date. With the next CPU landing on July 18, there’s plenty to consider.
Comments (0)
To Tackle IoT Security’s Murky Future, We Need Only to Look to the Past
May 05, 2017 Added by:Sean Tierney
To build secure IoT devices today, companies new and old should consider textbook security fundamentals that have been set by companies making networked devices for the past few decades.
Comments (0)
Ask a Security Pro: Encryption Explained
April 13, 2017 Added by:Logan Kipp
Modern encryption has become an arms race between brilliant mathematicians and their computers, and hackers and theirs.
Comments (0)
Growing Risk In IoT & Mobile App Security
April 07, 2017 Added by:Mandeep Khera
IoT and mobile app security is at considerable risk, as confusion of who owns security within the development, testing and implementation process remains in question.
Comments (0)
- SAP Cyber Threat Intelligence Report – April 2018
- Cloud Security Alert – Log Files Are Not the Answer
- Avoiding Holes in Your AWS Buckets
- The Three Great Threats to Modern Civilization
- 2020 Vision: How to Prepare for the Future of Information Security Threats
- Why Data Loss Prevention Will Suffer the Same Fate as Anti-Virus
- Unconventional Thinking — Four Practices to Help Mitigate Risk
- The Night the Lights Went out in Georgia (Almost)
- Is Blockchain Really Disruptive in Terms of Data Security?
- Half-Baked Security Approaches: What Cybersecurity Can Learn from Legal Weed