(INFOGRAPHIC) Web applications are inherently insecure due to vulnerabilities that are hard to patch and easy to exploit.
This whitepaper by Portcullis Labs discusses a number of attack vectors for SSL and TLS, offering real world examples where it can.
Please click on the image to download your FREE copy now.
Vendors such as Juniper Networks that are open sourcing their SDN controllers are pursuing a poor strategy that misses the point of the technology, HP representatives said this week.
BalaBit IT Security announced a new version of its Shell Control Box (SCB) activity monitoring appliance.
October is turning out to be a busy month for patches. Next week is Patch Tuesday, and both Adobe and Microsoft have published their advance notices, with one and eight bulletins respectively.
Adobe late today revealed that it recently discovered that it had suffered massive “sophisticated attacks” on its network that resulted in the theft of sensitive information including payment card information on 2.9 million customers
Take it from Harry Sverdlove, CTO of security firm Bit9, no organization – regardless of size or business — is immune to today’s attacks.
Clothing and jewelry embedded with microprocessors are a growing fad. The idea is that we’ll soon do our computing right from our apparel.
As if online advertisements were not enough of a nuisance, a sinister variant is gaining traction.
Previous $12.50 rewards were funded from IT security team’s pockets.