Webappsec->General

0b8e9d7009308c174e700bcaf89c4474

Q3 Oracle CPU Preview: Fewer Java SE Patches May Not Mean Fewer Flaws

July 16, 2018 Added by:James Lee

The July 2018 quarterly Oracle Critical Patch Update (CPU) is expected to set a new two-year high for total Oracle product patches.

Comments  (0)

D47111ebac9e529cc7e382f0f095f32b

"Can you Hear Me Now?” - Security Professionals Warn about Who May Be Listening

June 27, 2018 Added by:Jeannie Warner

In light of the recent move by Verizon to stop sharing location data with third parties, companies need to rethink strategies for data gathering from users.

Comments  (0)

B5e8617f76698eb78f0101a3db9326ae

Achieving Effective Application Security in a Cloud Generation

May 16, 2018 Added by:Jonathan Bregman

Cloud application security requires new approaches, policies, configurations, and strategies that both allow organizations to address business needs and security risks in unison.

Comments  (0)

9d9e32000b07da9c5acd1ad33accbbb6

Advancing the Usability of PKIs

February 06, 2018 Added by:Dan Timpson

If your organization is going to rely on PKI, it’s important to also leverage the benefits that automation can provide.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

The 5 Motives of Ransomware

January 04, 2018 Added by:Joseph Carson

Who would have foreseen the impact of both WannaCry and NotPetya

Comments  (0)

B5e8617f76698eb78f0101a3db9326ae

The Evolution from Waterfall to DevOps to DevSecOps and Continuous Security

November 03, 2017 Added by:Jonathan Bregman

The evolution of application development and the need for automated and continuous security, monitoring and incident response through the application lifecycle and beyond deployment.

Comments  (0)

E181257171d17cbf437b89cc372e76bc

Hey Alexa – Show Me Whitelisted Malware

October 10, 2017 Added by:Troy Kent

The team at Awake Security recently took a closer look at one seemingly benign list – the Alexa Top 1 Million list of domains – to assess whether it would be safe to use for whitelisting.

Comments  (0)

549d6bdceeadaa2dbb3424e069276645

No Such Thing as Too Small to Hack

September 07, 2017 Added by:Avi Bartov

Technology alone does not equal security, as owners and employees must begin to realize that their websites offer a potentially immense value proposition to hackers. An SMB is definitely not too small to care.

Comments  (0)

549d6bdceeadaa2dbb3424e069276645

Understanding Hacker Mindset Key for Website Security, Business Resilience

August 01, 2017 Added by:Avi Bartov

The traditional perimeter solutions are losing their effectiveness since hackers place more value in motive opportunities than they ever have previously.

Comments  (0)

800602abf6eb4ebc6c6cade7dbcec17a

Ask a Security Professional: WordPress Database Security Part Two — Best Practices

March 02, 2017 Added by:Logan Kipp

By following WordPress database security best practices, you become a better WordPress admin and a more effective guardian of the data in your website.

Comments  (0)

800602abf6eb4ebc6c6cade7dbcec17a

Ask a Security Professional: WordPress Database Security Part One — Anatomy of WordPress

March 01, 2017 Added by:Logan Kipp

Part One of #AskSecPro is an introduction to some of the infrastructure behind WordPress.

Comments  (0)

F08d1219500edcf01d8b56ee28634437

March Madness Security Threats Can Drive Any Organization Mad!

March 14, 2016 Added by:Mark Parker

Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.

Comments  (0)

C492d23f3758cf5cdee0b35b74cc36f1

Web Application Firewall: a Must-Have Security Control or an Outdated Technology?

March 09, 2016 Added by:Ilia Kolochenko

Being insufficient to properly mitigate complicated security flaws in modern web applications, a Web Application Firewall still remains a necessary security control within organizations. 

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Bringing Innovation into Cyberdefense Technologies

February 22, 2016 Added by:Larry Karisny

When I spoke on the need for cybersecurity innovation at the January ITEXPO conference in Fort Lauderdale, Fla., I sensed something interesting about my cybersecurity colleagues: They don't seem to care about innovation; they care about having a job in cybersecurity.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Yes. The World Needs More Security Predictions

February 17, 2016 Added by:Dan Lohrmann

With the surging growth in cyberspace, new technologies, Wi-Fi, apps, robots, drones, terrorists with social media accounts, the Internet of Things (IoT) and nation-state hacking, online data security has become the Achilles’ heel of the Internet. A growing number of people want to know about new apps available for their smartphones and their data in the cloud – along with the upcoming securit...

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

What Do Star Wars and Recent Data Breaches Teach Us About Cyber Ethics?

December 21, 2015 Added by:Dan Lohrmann

Beyond cyber war and the good guys having the right tools to catch the bad guys, there can be a tendency to ignore “more mundane” acceptable use directives. That is, security staff can download copyrighted material (movies and games), view porn at work, look at information that is private (like promotions, raises or other data from management), “borrow” passwords or delete log files to cov...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »