Web App Security

549d6bdceeadaa2dbb3424e069276645

No Such Thing as Too Small to Hack

September 07, 2017 Added by:Avi Bartov

Technology alone does not equal security, as owners and employees must begin to realize that their websites offer a potentially immense value proposition to hackers. An SMB is definitely not too small to care.

Comments  (0)

549d6bdceeadaa2dbb3424e069276645

Understanding Hacker Mindset Key for Website Security, Business Resilience

August 01, 2017 Added by:Avi Bartov

The traditional perimeter solutions are losing their effectiveness since hackers place more value in motive opportunities than they ever have previously.

Comments  (0)

6976e8f7c49ced75e060499dde816102

How to Prevent Ransomware and Cyberattacks

July 14, 2017 Added by:Steven Minsky

The impacts of ransomware and other breaches that exploit failures in risk management are preventable. An attack can come at any time, and failing to implement a strong prevention strategy is a recipe for disaster.

Comments  (0)

7fc123e0c16f296ad28a8c3214506aa9

Follow the Money — Stemming Hacker Habits

June 30, 2017 Added by:Steve McGregory

Cybercriminals aren’t stopping anytime soon. Ensure you have a finger on the pulse of your network or be ready to become another notch on a hacker’s belt.

Comments  (0)

E9a7f6f166af1eddf525c57aa3b4f1b6

The Upcoming Oracle CPU: Struggling to Keep Pace with Vulnerabilities

June 28, 2017 Added by:James E. Lee

Oracle's April 2017 update was its largest CPU to date. With the next CPU landing on July 18, there’s plenty to consider.

Comments  (0)

5c34159020b03e81c9ae7077282a2bd4

To Tackle IoT Security’s Murky Future, We Need Only to Look to the Past

May 05, 2017 Added by:Sean Tierney

To build secure IoT devices today, companies new and old should consider textbook security fundamentals that have been set by companies making networked devices for the past few decades.

Comments  (0)

800602abf6eb4ebc6c6cade7dbcec17a

Ask a Security Pro: Encryption Explained

April 13, 2017 Added by:Logan Kipp

Modern encryption has become an arms race between brilliant mathematicians and their computers, and hackers and theirs.

Comments  (0)

7f2b2f3993942d8fffe0959b532816ea

Growing Risk In IoT & Mobile App Security

April 07, 2017 Added by:Mandeep Khera

IoT and mobile app security is at considerable risk, as confusion of who owns security within the development, testing and implementation process remains in question.

Comments  (0)

9426edcb04ba15a57df6d674f1c74db9

Why Is Digital Property Monitored Less than Physical Property?

March 09, 2017 Added by:Ajit Singh

If we were to place as much emphasis on monitoring events that take place on our IT systems as we do monitoring spending habits and shoplifting, many of the data breaches we hear about today could be largely mitigated.

Comments  (0)

800602abf6eb4ebc6c6cade7dbcec17a

Ask a Security Professional: WordPress Database Security Part Two — Best Practices

March 02, 2017 Added by:Logan Kipp

By following WordPress database security best practices, you become a better WordPress admin and a more effective guardian of the data in your website.

Comments  (0)

800602abf6eb4ebc6c6cade7dbcec17a

Ask a Security Professional: WordPress Database Security Part One — Anatomy of WordPress

March 01, 2017 Added by:Logan Kipp

Part One of #AskSecPro is an introduction to some of the infrastructure behind WordPress.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

DigitalOcean Launches Public Bug Bounty Program

February 17, 2017 Added by:Ionut Arghire

Cloud computing platform DigitalOcean announced the public availability of its bug bounty program, after successfully running it in private mode.

Comments  (0)

Fa053a3185c9b7154992fb4bffe11e76

FriendFinder Breach Highlights the Need for Better Practice in Password Security

January 31, 2017 Added by:Donato Capitella

The FriendFinder Network breach is a perfect example of how poor password storage can exacerbate the impact of a breach and expose accounts to further exploitation.

Comments  (0)

C66e591693fd6e7b26fc5a60efb68817

Alan Turing, Undecidable Problems, and Malware

January 23, 2017 Added by:Kenneth Geers

In order to keep workers happy and productivity high, sometimes you have to run untrusted code. But that code should be run in quarantine, where it cannot damage your IT infrastructure.

Comments  (0)

18d2ccc39431a1f63d67dd3252263400

The Hidden Security Risks of Cloud APIs

December 02, 2016 Added by:Sam Rehman

With the inherent security flaws taken care of, cloud software can take full advantage of the benefits of APIs without exposing themselves or their clients to attack.

Comments  (0)

591c39c65cf5c298ccd0f1cd5818e961

Differential Privacy vs. End-to-end Encryption – It’s Privacy vs. Privacy!

October 12, 2016 Added by:Vanishree Rao

While differential privacy is a promising tool, implementing and deploying it while retaining the privacy of end-to-end encryption is challenging.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »