Webappsec->General
Internet-Exposed IBM BigFix Relays May Lead to Full Remote Compromise
March 21, 2019 Added by:Ionut Arghire
Internet-facing relays in IBM BigFix deployments could lead to information disclosure and potential full remote compromise if not properly configured, Atredis Partners security researchers have discovered.
Comments (0)
OWASP: What Are the Top 10 Threats and Why Does It Matter?
January 30, 2019 Added by:Nitzan Miron
Since the founding of the Open Web Application Security Project (OWASP) in 2001, it has become a leading resource for online security best practices.
Comments (0)
IAST Technology Is Revolutionizing Sensitive Data Security
January 08, 2019 Added by:Asma Zubair
IAST is the most optimal way to test for application security, sensitive data leakage, and prevent breaches.
Comments (0)
Q3 Oracle CPU Preview: Fewer Java SE Patches May Not Mean Fewer Flaws
July 16, 2018 Added by:James Lee
The July 2018 quarterly Oracle Critical Patch Update (CPU) is expected to set a new two-year high for total Oracle product patches.
Comments (0)
"Can you Hear Me Now?” - Security Professionals Warn about Who May Be Listening
June 27, 2018 Added by:Jeannie Warner
In light of the recent move by Verizon to stop sharing location data with third parties, companies need to rethink strategies for data gathering from users.
Comments (0)
Achieving Effective Application Security in a Cloud Generation
May 16, 2018 Added by:Jonathan Bregman
Cloud application security requires new approaches, policies, configurations, and strategies that both allow organizations to address business needs and security risks in unison.
Comments (0)
Advancing the Usability of PKIs
February 06, 2018 Added by:Dan Timpson
If your organization is going to rely on PKI, it’s important to also leverage the benefits that automation can provide.
Comments (0)
The 5 Motives of Ransomware
January 04, 2018 Added by:Joseph Carson
Who would have foreseen the impact of both WannaCry and NotPetya
Comments (0)
The Evolution from Waterfall to DevOps to DevSecOps and Continuous Security
November 03, 2017 Added by:Jonathan Bregman
The evolution of application development and the need for automated and continuous security, monitoring and incident response through the application lifecycle and beyond deployment.
Comments (0)
Hey Alexa – Show Me Whitelisted Malware
October 10, 2017 Added by:Troy Kent
The team at Awake Security recently took a closer look at one seemingly benign list – the Alexa Top 1 Million list of domains – to assess whether it would be safe to use for whitelisting.
Comments (0)
No Such Thing as Too Small to Hack
September 07, 2017 Added by:Avi Bartov
Technology alone does not equal security, as owners and employees must begin to realize that their websites offer a potentially immense value proposition to hackers. An SMB is definitely not too small to care.
Comments (0)
Understanding Hacker Mindset Key for Website Security, Business Resilience
August 01, 2017 Added by:Avi Bartov
The traditional perimeter solutions are losing their effectiveness since hackers place more value in motive opportunities than they ever have previously.
Comments (0)
Ask a Security Professional: WordPress Database Security Part Two — Best Practices
March 02, 2017 Added by:Logan Kipp
By following WordPress database security best practices, you become a better WordPress admin and a more effective guardian of the data in your website.
Comments (0)
Ask a Security Professional: WordPress Database Security Part One — Anatomy of WordPress
March 01, 2017 Added by:Logan Kipp
Part One of #AskSecPro is an introduction to some of the infrastructure behind WordPress.
Comments (0)
March Madness Security Threats Can Drive Any Organization Mad!
March 14, 2016 Added by:Mark Parker
Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.
Comments (0)
Web Application Firewall: a Must-Have Security Control or an Outdated Technology?
March 09, 2016 Added by:Ilia Kolochenko
Being insufficient to properly mitigate complicated security flaws in modern web applications, a Web Application Firewall still remains a necessary security control within organizations.
Comments (0)
- GitHub Hires Former Cisco Executive Mike Hanley as Chief Security Officer
- Reddit Names Allison Miller as Chief Information Security Officer (CISO)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps