How Web Application Firewalls and Next Generation Firewalls Stack up against the OWASP Top 10

(INFOGRAPHIC) Web applications are inherently insecure due to vulnerabilities that are hard to patch and easy to exploit.
SSL Good Practice Guide – Portcullis Labs

This whitepaper by Portcullis Labs discusses a number of attack vectors for SSL and TLS, offering real world examples where it can.
Please click on the image to download your FREE copy now.
HP says open sourcing SDNs is wrong

Vendors such as Juniper Networks that are open sourcing their SDN controllers are pursuing a poor strategy that misses the point of the technology, HP representatives said this week.
Shell Control Box now monitors web based applications

BalaBit IT Security announced a new version of its Shell Control Box (SCB) activity monitoring appliance.
Microsoft to unveil eight bulletins on Tuesday

October is turning out to be a busy month for patches. Next week is Patch Tuesday, and both Adobe and Microsoft have published their advance notices, with one and eight bulletins respectively.
Adobe Hacked: Source Code, Customer Data Stolen

Adobe late today revealed that it recently discovered that it had suffered massive “sophisticated attacks” on its network that resulted in the theft of sensitive information including payment card information on 2.9 million customers
5 Lessons From Real-World Attacks

Take it from Harry Sverdlove, CTO of security firm Bit9, no organization – regardless of size or business — is immune to today’s attacks.
Hackers show off Google Glass ‘instruments’ and ‘drumpants’

Clothing and jewelry embedded with microprocessors are a growing fad. The idea is that we’ll soon do our computing right from our apparel.
Malvertising: An attack that could be easily avoided

As if online advertisements were not enough of a nuisance, a sinister variant is gaining traction.
Yahoo plots bug bounties up to $15,000

Previous $12.50 rewards were funded from IT security team’s pockets.