October 5, 2015 From the Grave: Adobe Exploit Rises Again 2 min read - An Adobe Flash Player exploit has reappeared after it was thought to be mitigated in a recent patch. What's the risk for users of this popular program?
Endpoint October 2, 2015 Security Hygiene in the Internet of Things 5 min read - Security hygiene becomes exponentially more difficult as the Internet of Things expands the number of smart devices connected in an enterprise.
October 1, 2015 Want a Better Windows Encrypt? Take a Pass on TrueCrypt 2 min read - Looking for the best way to encrypt Windows drives? Take a pass on open-source TrueCrypt, which was recently found to have critical flaws.
Application Security September 30, 2015 10 Convenient Ways to #CoverYourApps and Increase Application Security Testing Knowledge in Your Organization 4 min read - Here are 10 ways you can improve your application security testing knowledge and posture — without a massive investment of time or money.
September 29, 2015 Yahoo’s Gryffin Security Scanner Could Help Companies Better Protect Web Applications 2 min read - System admins can never be sure of where the next online attack will come from, which is why Yahoo has released a new Web application security scanner.
September 24, 2015 Building a Bug Bounty? Start Here 3 min read - Many companies are now considering their own bug bounty program, and HackerOne has designed a free assessment tool to get the ball rolling.
CISO September 24, 2015 High-Impact Security Flaws and Why They’re Still Being Overlooked 2 min read - Seemingly simple security flaws can cause major damage for organizations, most often in the form of massive data breaches caused by the vulnerability.
Fraud Protection September 24, 2015 Authentication: The Enterprise’s Weakest Link 3 min read - Many organizations struggle to find the right authentication methods for their employees and needs, but they can ill afford to let malpractice continue.
Endpoint September 15, 2015 The Impact of the End of Windows XP on Your Enterprise 3 min read - It wasn't all that long ago that Windows XP was present in the vast majority of enterprises. In fact, it's still prevalent, bringing many security risks.
Software Vulnerabilities September 11, 2015 Common Mobile App Vulnerabilities You May Be Overlooking 2 min read - There are a few common mobile app vulnerabilities that enterprises may be overlooking even as they complete security tests. Here's a few to watch out for.