Security

Last Updated on 25 May 2015, Total: 72 Blog Posts

  1. Secret questions are insecure and easily forgotten

    Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google... Read More

  2. The DMZ Soft Spot

    Cloud DMZ: a functional replica of the original website which serves a significant portion of the requests to the original site and creates an additional security layer... Read More

  3. The state of Cybersecurity

    An ISACA and RSA Conference survey about the state of Cyber-security and its implications for 2015... Read More

  4. Magento e-commerce web platform vulnerability

    Store owners and administrators of Magento are urged to take action immediately and apply the patch released to address these flaws... Read More

  5. 5 Crucial Parts of Cloud Computing Security People Often Forget About

    Guest blog post by Sameer Bhatia founder and CEO of ProProfs, a leading provider of online learning tools for building, testing, and applying knowledge... Read More

  6. Major Trends in Cloud Security

    Holger Schulze, Group Founder Information Security Community on LinkedIn presents the outcome of a comprehensive research that shows how your peers are approaching security in the era of cloud infrastructure and gain valuable benchmark data to gauge how your own organization stacks up... Read More

  7. The Risks of SSL Inspection

    SSL and TLS do not provide the level of end-to-end security that users may expect... Read More

  8. URL Abuse online testing tool

    The service is an online web service where any user can submit a link. You will need javascript enabled to access the page and the content is delivered when available via AJAX... Read More

  9. Tracking the FREAK Attack

    Make sure you have the most recent version of your browser installed, and check for updates frequently. Updates that fix the FREAK attack should be available for all major browsers soon... Read More

  10. CrowdStrike’s Global Threat Intelligence Report

    In 2014, it became abundantly clear that threat intelligence would provide the decisive advantage when protecting your network... Read More

Featured Links