Weak Security Coding Practices for Mobile Apps

weak security coding practices for mobile apps

Intel Security has launched its quarterly McAfee Labs Threats Report, revealing key cyber-attack developments over the third quarter of 2015. Key threat areas outlined in the report include: Weak security coding practices for mobile apps can expose data: Malware strains are being designed to take advantage of poor mobile app coding connecting mobile apps to […]

DNS Security is too Easily Taken for Granted

DNS Security is too Easily Taken for Granted

Organisations invest a lot of time, resources and money into ensuring the security of their back office systems but this can often be in vein if they fail to account for the external threats impacting their business. The security of your DNS provider is arguably one of the biggest examples of this. Recently, it was revealed that webhosting company Easily […]

Security Concerns and Lack of Visibility Hinder Cloud Adoption

Lack of Visibility Hinder Cloud Adoption

Netwrix 2015 Cloud Security Survey reveals unauthorised access and account hijacking are the leading security risks associated with the cloud Netwrix released the results of its global 2015 Cloud Security Survey that show when it comes to migrating to the cloud, 65% of companies are concerned with security and 40% worry about their loss of […]

Personal Websites taken Offline With Web Host Moonfruit

Web Host Moonfruit

You may have seen the news this morning that Moonfruit has taken websites offline following a cyber-attack threat. Thousands of business and personal websites have been taken offline with web host Moonfruit deciding to make its customers’ websites unavailable for “up to 12 hours” in order to make infrastructure changes. DDoS attacks are bad for […]

Blocks Zero-Day Threats with DNS Threat Analytics

DNS Threat Analytics

Behavioural analytics applied to DNS traffic helps enterprises and services providers prevent data theft Infoblox Inc. (NYSE:BLOX), the network control company, introduced Infoblox DNS Threat Analytics, the first technology that applies behavioural analytics to DNS queries in real time to detect and actively block data exfiltration attempts using DNS as a communications pathway. Stealing proprietary […]

Value vs. Vulnerability: The Business Dilemma of Information on the Move

Value vs. Vulnerability

The information created and processed by a business, whether about products, operations, customers or financial performance, can play a vital role in commercial success and even survival. And while every business keeps different types of information, some unique and some typical of its industry sector, it is widely believed that exploiting data sets to inform […]

“State-Sponsored” Cyber Attacks

"State-Sponsored" Cyber Attacks

Following the news of the Twitter cyber attacks, please find below advisory comment from David Emm, principal security researcher at Kaspersky Lab, who provides insight on why Twitter believes these attacks were “state-sponsored”. [su_note note_color=”#ffffcc” text_color=”#00000″]David Emm, Principal Security Researcher at Kaspersky Lab : It has been revealed that Twitter has sent warnings to a number […]

Server Data Protection for Enterprise CloudOps

Server Data Protection for Enterprise CloudOps

Expands CTERA Enterprise File Services Platform to Feature Cloud-Agnostic Data Protection for Cloud Servers with Automated IT-as-a-Service Delivery CTERA Networks today announced a fully automated and secure in-cloud and cloud-to-cloud data protection solution that allows enterprises to protect any number of servers across any cloud infrastructure. CTERA Cloud Server Data Protection is designed for enterprise […]

How can Companies Benefit from Embracing Open Source software?

Embracing Open Source software?

Open source: Security through transparency The contrast between proprietary and open source software is as old as the IT industry itself. Software in almost every category is available either from suppliers who develop and market their code by themselves or from developer communities who work with open code. Over the last decade the aversion to […]

Germany’s Move to Force Carmakers to Reveal Software

Carmakers to Reveal Software

You may have seen news that, following the recent emissions scandal, carmakers seeking approval of new vehicles in Germany will be required to give the country’s regulators access to their software. Paul Farrington, senior solution architect at Veracode have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Paul Farrington, Senior Solution Architect at Veracode : “The […]