ITOps In The Modern Ops World
As modern operations gain momentum, it is quickly becoming the new norm for business. Infrastructure has become malleable and self-service is in demand. As a result, traditional IT operations need to...
View ArticleBig Data Security: Vulnerability Management
Mitesh Shah, Senior Product Manager for Security and Data Governance at MapR, describes an important concept in big data security: vulnerability management, which is a key layer in the trust model. He...
View ArticleEnabling Secure Web Payments with GNU Taler
GNU Taler is a new electronic online payment system which provides privacy for customers and accountability for merchants. It uses an exchange service to issue digital coins using blind signatures, and...
View ArticleIDG Contributor Network: Dropbox breach shows how impactful poor security can be
Way back in the dark ages (well, four years ago, anyway), something happened within file sharing vendor Dropbox that, all these years later, has come back to haunt the powerhouse and its customers....
View ArticleCSP Is Dead, Long Live CSP - on the Insecurity of Whitelists
Abstract Content Security Policy is a web platform mechanism designed to mitigate cross-site scripting (XSS), the top security vulnerability in modern web applications. In this paper, we take a closer...
View ArticleSecurity Week: Betabot Starts Delivering Cerber Ransomware
Betabot, a piece of malware that has been around for years, recently started to deliver ransomware to compromised computers, Invincea reveals. Previously, Betabot was primarily a banking information...
View Article如果,你的DNS提供商遭遇DDoS攻击该怎么办?
很多企业都曾思考或者经历过:当其系统遭受针对性分布式拒绝服务攻击会发生什么。多年来,我们看到很多看似灵活的企业由于分布式拒绝服务攻击失去其核心网络业务。 特定系统网络中断是一回事;但是,你有没有想过,如果你企业整个域名系统功能都失效会发生什么?域名系统(DNS)基本是互联网(以及你的企业)的循环系统,我们很难想象企业没有它可以存活。...
View ArticleShavlik Protect Wins the Gold Award in the Security Category for “Best of...
Award celebrates Shavlik’s pioneering patch solution and its strength in helping to protect virtual environments LONDON ― September 2, 2016― Shavlik, a global leader in IT management and innovative...
View ArticleWoSign's secret purchase of StartCom; WoSign threatened legal actions
I called forWoSign's revocationearlier thisweek for its utter ignorance over security. However, WoSign is cross signed by StartCom. Meaning that as long as StartCom is trusted, even if WoSign is...
View ArticleEnd users struggle to identify security threats and put enterprises at risk
There's a reason why cyber attacks use social engineering techniques, it's because the person sitting in front of the screen is usually the weakest link in the security chain. This is confirmed by the...
View ArticleApple issues urgent security update after hack turns Mac computers into...
Apple issues urgent security update after hack turns Mac computers into spying devices Apple has issued a software update to patch the flaw Credit: David Rose A pple has released an urgent update to...
View ArticleHow to boost sales by improving your trust signals
It’s obvious that the internet has a conversion problem, and many businesses are constantly evolving ways to better convert traffic they get. In this quest, they consider things like A/B testing,...
View ArticleUpdate your Mac OS X ― Apple has released Important Security Updates
If you own a Mac laptop or desktop, you need to update your system right now. It turns out that the critical zero-day security vulnerabilities disclosed last week, which targeted iPhone and iPad users,...
View ArticleAugust with Cossack Labs
Summer comes to an end, but finalizing development of few new products you’re about to hear in upcoming weeks, polishing Themis and presenting talks based on our developments is in full swing. Our...
View ArticleMulti-site with Cross-VC NSX: Consistent Security and Micro-segmentation...
Several posts have been written prior on multi-site with Cross-VC NSX describing the fundamentals, use cases, deployment models, and flexibility Cross-VC NSX provides. In this post, we focus on the...
View ArticleTippingPoint Threat Intelligence and Zero-Day Coverage Week of August 29, 201...
Earlier this week, the entertainment world lost Gene Wilder, one of the most talented comedians and screenwriters in the business. While many will remember him for his work in the movies Willy Wonka...
View ArticleSecurity Think Tank: Addressing the malware arms race
Malware propagation is a bit like sales. Success can come either from playing the numbers game or by taking a more strategic and focused approach. There are pros and cons for each approach and they...
View ArticleAuditors vs. Admins
As security becomes more and more important each day, there is a need for the IT community to understand the differences between auditors and administrators. The reason we need to keep these different...
View ArticleKaspersky 'terminates' deal with security reseller Quadsys
Kaspersky Lab is the first big vendor to publicly rip up its contract with disgraced security reseller Quadsys in the wake of the hacking scandal that the company’s bosses recently admitted to. On 22...
View ArticleVMware NSX Security: Features And Use Cases
Data centers are undergoing big changes in order to accommodate huge chunks of data in industries. As this data is very important, it is vital to provide good solutions to store it. Physical data...
View Article