Web App Security
March 09, 2017 Added by:Ajit Singh
If we were to place as much emphasis on monitoring events that take place on our IT systems as we do monitoring spending habits and shoplifting, many of the data breaches we hear about today could be largely mitigated.
March 02, 2017 Added by:Logan Kipp
By following WordPress database security best practices, you become a better WordPress admin and a more effective guardian of the data in your website.
March 01, 2017 Added by:Logan Kipp
Part One of #AskSecPro is an introduction to some of the infrastructure behind WordPress.
January 31, 2017 Added by:Donato Capitella
The FriendFinder Network breach is a perfect example of how poor password storage can exacerbate the impact of a breach and expose accounts to further exploitation.
October 12, 2016 Added by:Vanishree Rao
While differential privacy is a promising tool, implementing and deploying it while retaining the privacy of end-to-end encryption is challenging.
September 23, 2016 Added by:David Poole
ID&V is part of our lives and while there might be complaints about the inconvenience that obtrusive security plays in digital commerce, it is still an improvement on how things used to be.
August 23, 2016 Added by:Mike Paquette
Not all security analytics solutions are created equal. There are five key characteristics critically important to ensuring that your security analytics are effective and capable of stopping today’s advanced threats.
August 18, 2016 Added by:Scott Gordon
Next generation F-DRM solutions offer an effective and flexible technical control that can be applied today to reduce file data leakage risks across different infrastructure, collaboration methods, user types and business requirements.
August 11, 2016 Added by:Alexander Polyakov
SAP has released the monthly critical patch update for August 2016. This patch update closes 30 vulnerabilities in SAP products including 26 SAP Security Patch Day Notes and 4 Support Package Notes.
August 11, 2016 Added by:Karl Sigler
Exploit kits are increasingly using the evil twin of an advertisement, a malvertisement, as a gateway to a web browser.
August 11, 2016 Added by:Joe Levy
Although the FBI no longer needs to force Apple to unlock an iPhone that belonged to one of the San Bernardino terrorists, the debate must continue. Strong encryption that cannot be exploited by external or internal actors is a must for any organization.
Hacker to Release Symantec's PCAnywhere Sour... Jerry Shaw on 10-05-2015
PoS Malware Kits Rose in Underground in 2014... on 03-17-2015
New PCI Compliance Study... on 03-17-2015