Web App Security

9d9e32000b07da9c5acd1ad33accbbb6

Advancing the Usability of PKIs

February 06, 2018 Added by:Dan Timpson

If your organization is going to rely on PKI, it’s important to also leverage the benefits that automation can provide.

Comments  (0)

9ae0fe776de46500a4f71f32673fad0f

Increasing Importance of Mobile Makes Malware a Priority

January 17, 2018 Added by:Asma Zubair

Businesses should fortify their high value apps with additional security precautions from the inside out.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

The 5 Motives of Ransomware

January 04, 2018 Added by:Joseph Carson

Who would have foreseen the impact of both WannaCry and NotPetya

Comments  (0)

3013a8d01542d3101f0a905ab013f00a

Shadow IT: The Invisible Network

November 14, 2017 Added by:Chris Jordan

Shadow IT is the term most related to the risk associated with the threat that application awareness addresses.

Comments  (0)

B5e8617f76698eb78f0101a3db9326ae

The Evolution from Waterfall to DevOps to DevSecOps and Continuous Security

November 03, 2017 Added by:Jonathan Bregman

The evolution of application development and the need for automated and continuous security, monitoring and incident response through the application lifecycle and beyond deployment.

Comments  (0)

E9a7f6f166af1eddf525c57aa3b4f1b6

Oracle CPU Preview: What to Expect in the October 2017 Critical Patch Update

October 17, 2017 Added by:James E. Lee

In a pre-release statement, Oracle has revealed that the October Critical Patch Update (CPU) is likely to see nearly two dozen fixes to Java SE, the most common language used for web applications.

Comments  (0)

E181257171d17cbf437b89cc372e76bc

Hey Alexa – Show Me Whitelisted Malware

October 10, 2017 Added by:Troy Kent

The team at Awake Security recently took a closer look at one seemingly benign list – the Alexa Top 1 Million list of domains – to assess whether it would be safe to use for whitelisting.

Comments  (0)

591c39c65cf5c298ccd0f1cd5818e961

The Weakest Link In Banking Security – ATMs

October 03, 2017 Added by:Vanishree Rao

We have recently seen the weak link theory play out with the very familiar Automated Teller Machines (ATMs) that are used regularly around the globe.

Comments  (0)

549d6bdceeadaa2dbb3424e069276645

No Such Thing as Too Small to Hack

September 07, 2017 Added by:Avi Bartov

Technology alone does not equal security, as owners and employees must begin to realize that their websites offer a potentially immense value proposition to hackers. An SMB is definitely not too small to care.

Comments  (0)

549d6bdceeadaa2dbb3424e069276645

Understanding Hacker Mindset Key for Website Security, Business Resilience

August 01, 2017 Added by:Avi Bartov

The traditional perimeter solutions are losing their effectiveness since hackers place more value in motive opportunities than they ever have previously.

Comments  (0)

6976e8f7c49ced75e060499dde816102

How to Prevent Ransomware and Cyberattacks

July 14, 2017 Added by:Steven Minsky

The impacts of ransomware and other breaches that exploit failures in risk management are preventable. An attack can come at any time, and failing to implement a strong prevention strategy is a recipe for disaster.

Comments  (0)

7fc123e0c16f296ad28a8c3214506aa9

Follow the Money — Stemming Hacker Habits

June 30, 2017 Added by:Steve McGregory

Cybercriminals aren’t stopping anytime soon. Ensure you have a finger on the pulse of your network or be ready to become another notch on a hacker’s belt.

Comments  (0)

E9a7f6f166af1eddf525c57aa3b4f1b6

The Upcoming Oracle CPU: Struggling to Keep Pace with Vulnerabilities

June 28, 2017 Added by:James E. Lee

Oracle's April 2017 update was its largest CPU to date. With the next CPU landing on July 18, there’s plenty to consider.

Comments  (0)

5c34159020b03e81c9ae7077282a2bd4

To Tackle IoT Security’s Murky Future, We Need Only to Look to the Past

May 05, 2017 Added by:Sean Tierney

To build secure IoT devices today, companies new and old should consider textbook security fundamentals that have been set by companies making networked devices for the past few decades.

Comments  (0)

800602abf6eb4ebc6c6cade7dbcec17a

Ask a Security Pro: Encryption Explained

April 13, 2017 Added by:Logan Kipp

Modern encryption has become an arms race between brilliant mathematicians and their computers, and hackers and theirs.

Comments  (0)

7f2b2f3993942d8fffe0959b532816ea

Growing Risk In IoT & Mobile App Security

April 07, 2017 Added by:Mandeep Khera

IoT and mobile app security is at considerable risk, as confusion of who owns security within the development, testing and implementation process remains in question.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »