Healthcare Industry: In Need of Security Medicine

As part of an ongoing series, we’re examining the security and compliance needs and ...

Financial Services: High-risk security, by the numbers

Our latest addition to the industry-by-industry security analysis series is financial ...

Oct 15, 2014

SSL v3 vulnerability: this POODLE eats secure cookies

What this is: A method to compromise communication encrypted by SSL v3 (meaning: access ...

Oct 15, 2014

SSL v3 Vulnerability - Remedies and What You Can Do

If you are running systems that maintain SSL 3.0 compatibility, you are advised to define a ...

Shadow IT and Educational Moments

One of the most serious security challenges for enterprises today is the ease with which ...

Manufacturing: Big Industry, Big Security Challenges

In this latest installment in our series of profiles on security and compliance issues and ...

Oct 02, 2014

Managed Service Providers: drivers for competitive advantages? Part 2

This is a continuation of my previous blog post which aims to discuss the near future ...

Shellshock is Shocking, According to Shellers

If you’ve had a few spare moments to peruse the news, and happen to do so with an eye toward ...

Continuous Security Monitoring in a Continuous World

In today’s highly virtualized environments, where continuous integration and deployment are ...

Think like a Dev, act like an Op and harness Security – Part One

Creating software is a perpetual journey. Just like relationships, technologies start young ...

Home Depot, Target, and the business of being owned

There has recently been some interesting news. It seems that The Home Depot, both in the US ...

Retail Industry Ramps Up Efforts to Boost Security - and How the Channel Can Play a Role

As we mentioned in the last post, over the coming months we’ll be looking at the unique ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW