By now, we’re all well aware that PCI-DSS compliance is required for any business accepting online payments via credit/debit card. Even the savviest IT...
Hi, what are you looking for?
By now, we’re all well aware that PCI-DSS compliance is required for any business accepting online payments via credit/debit card. Even the savviest IT...
If 2012 has shown us anything about the security landscape, it’s that we’ve come very far in defending against – and deterring – attacks....
It’s easy to feel uncertainty about where to start to properly cover all the bases when it comes to securing your infrastructure. Evolving security...
Among the everyday news of security breaches, there is one recent incident that brought to light a certain vulnerability we often take for granted...
Just when you start getting comfortable thinking that DDoS or SQL injections are the attack methods that deserve your heavyweight protective measures, another type...
While There are Numerous Options on How to Protect Mobile Payments, Attaining Impermeable Protection is Non-Negotiable.
Putting Business Continuity Plans in Place Now, Means You Won’t Have to Scramble When It’s Time to Trigger Your Disaster Recovery Plan...
While SQL Injection Attacks are Growing in Frequency, Savvy Application Developers Can Find Enough Available Tools to Combat Them
Each year, security experts and IT experts take a hard look at the threats that dominated in years past in an effort to prepare...
In Public Cloud Environments, CIOs Can’t Count on Basic Firewalls and Other Mechanisms That Protect the Outer Layer of the Whole Cloud.
Organizations Don’t Have to be Fearful of Public Clouds, They Just Need to Better Understand Them.
In my previous column I touched on the point of implementing Web Application Firewalls (WAFs) as part of a measure to prevent clickjacking. I...