Nov 20, 2014

Government Agencies: Prime Targets for Security Breaches

Up to now in our series about security in various sectors, we have been covering different ...

Nov 18, 2014

No Big Surprise: Security Lessons Fail to Hit Home

Despite years of data security failures, enterprises fail to heed the many lessons learned. ...

Nov 06, 2014

4 Things You Should Know Before Running A Botnet

1) They understand what they are doing Herding a botnet isn’t easy these days. The people ...

Nov 04, 2014

A ‘Teachable Moment’ for VARs and MSPs: Security in the Education Sector

The next entry in our ongoing series covering industry-specific security issues is the ...

Don’t Let the Internet of Things Catch You by Surprise

You can’t turn anywhere without hearing about the Internet of Things. But does all of the ...

Financial Services: High-risk security, by the numbers

Our latest addition to the industry-by-industry security analysis series is financial ...

Oct 15, 2014

SSL v3 vulnerability: this POODLE eats secure cookies

What this is: A method to compromise communication encrypted by SSL v3 (meaning: access ...

Oct 15, 2014

SSL v3 Vulnerability - Remedies and What You Can Do

If you are running systems that maintain SSL 3.0 compatibility, you are advised to define a ...

Shadow IT and Educational Moments

One of the most serious security challenges for enterprises today is the ease with which ...

Think like a Dev, act like an Op and harness Security – Part One

Creating software is a perpetual journey. Just like relationships, technologies start young ...

Home Depot, Target, and the business of being owned

There has recently been some interesting news. It seems that The Home Depot, both in the US ...

When Moving to DevOps, Security Can Enhance the Ride

DevOps and continuous integration and deployment efforts boost productivity and agility, but ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW