Crypto-Segmentation Solutions Can Protect Application Flows on Internal and External Networks, Block Top Data Breach Attack Vector Certes Networks, a…
Browsing: Application Security
The highly publicised recent hack of the Hacking Team, the company that provides spyware and surveillance technology to governments and…
High-Tech Bridge’s Research Team has identified a critical vulnerability in WordPress’ Gwolle Guestbook plugin, which has over 10,000 active installations.…
How well do you think companies are dealing with security threats? Does it vary much between sectors? Companies are not…
Introduction With cyber-attacks as well as cyber-crime against large companies rising 40 percent globally in 2014, network security needs to…
Successful attempts by hackers like Lizard Squad to take down major websites have become so common that barely a week…
Marc Gaffan, VP and GM of the Incapsula product line at Imperva, commented on news that the Thai Government was…
Report Offers a Detailed Look at How a Consumer Banking Trojan Can Infect a Company Imperva, Inc. (NYSE:IMPV) committed to…
The Android Stagefright bug is back and this time, the flaw allows an attacker to hack Android smartphones just by tricking…
Report Offers a Detailed Look at How a Consumer Banking Trojan Can Infect a Company Imperva, Inc. (NYSE:IMPV) committed to…