Don’t Let the Internet of Things Catch You by Surprise
You can’t turn anywhere without hearing about the Internet of Things. But does all of the ...
Financial Services: High-risk security, by the numbers
Our latest addition to the industry-by-industry security analysis series is financial ...
SSL v3 vulnerability: this POODLE eats secure cookies
What this is: A method to compromise communication encrypted by SSL v3 (meaning: access ...
SSL v3 Vulnerability - Remedies and What You Can Do
If you are running systems that maintain SSL 3.0 compatibility, you are advised to define a ...
Shadow IT and Educational Moments
One of the most serious security challenges for enterprises today is the ease with which ...
Think like a Dev, act like an Op and harness Security – Part One
Creating software is a perpetual journey. Just like relationships, technologies start young ...
Home Depot, Target, and the business of being owned
There has recently been some interesting news. It seems that The Home Depot, both in the US ...
When Moving to DevOps, Security Can Enhance the Ride
DevOps and continuous integration and deployment efforts boost productivity and agility, but ...
The State of Endpoint Security in Virtual Environments
There’s no question that the majority of organizations are virtualizing servers, and ...
Pointers on Not Being an APT Statistic (or How I Learned to Love Bug)
Several weeks ago we started a series dedicated to considering APTs (Advanced Persistent ...
“AV is dead”: declarations and language
There has been quite a bit of marketing effort put into declaring that AV is dead. It is ...
Advanced Persistent Threats – Silver Bullets That Fail
This is the second post from a series we thought necessary to dedicate to APTs (Advanced ...