Oct 15, 2014

SSL v3 vulnerability: this POODLE eats secure cookies

What this is: A method to compromise communication encrypted by SSL v3 (meaning: access ...

Oct 15, 2014

SSL v3 Vulnerability - Remedies and What You Can Do

If you are running systems that maintain SSL 3.0 compatibility, you are advised to define a ...

Shadow IT and Educational Moments

One of the most serious security challenges for enterprises today is the ease with which ...

Manufacturing: Big Industry, Big Security Challenges

In this latest installment in our series of profiles on security and compliance issues and ...

Oct 02, 2014

Managed Service Providers: drivers for competitive advantages? Part 2

This is a continuation of my previous blog post which aims to discuss the near future ...

Shellshock is Shocking, According to Shellers

If you’ve had a few spare moments to peruse the news, and happen to do so with an eye toward ...

Continuous Security Monitoring in a Continuous World

In today’s highly virtualized environments, where continuous integration and deployment are ...

Think like a Dev, act like an Op and harness Security – Part One

Creating software is a perpetual journey. Just like relationships, technologies start young ...

Home Depot, Target, and the business of being owned

There has recently been some interesting news. It seems that The Home Depot, both in the US ...

Retail Industry Ramps Up Efforts to Boost Security - and How the Channel Can Play a Role

As we mentioned in the last post, over the coming months we’ll be looking at the unique ...

When Moving to DevOps, Security Can Enhance the Ride

DevOps and continuous integration and deployment efforts boost productivity and agility, but ...

Sex, Photos, and the Shared Security Model

Recently, there has been quite a bit of media coverage about some sensitive, private ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW