Mobile has opened up many new ways for users to communicate and connect without being tied to a desk or a power outlet - and at the same time, it has presented hackers with many more opportunities to perpetrate fraud and carry out attacks that cannot be detected with traditional tools used to detect attacks in web...
The process of managing software vulnerabilities inside the enterprise is complicated by the sheer number of patches that must be assessed, applied, tested and rolled out, says Wolfgang Kandek of Qualys, who offers suggestions on how to better focus those efforts.
Due to the increase in security breaches over the past few years, you know that legacy approaches to data center security are not adequate. Micro-segmentation could be the answer - but what does it really mean and how do you do it? Read this solution overview to find out.
This brief explains why it's time to take the next step toward the software-defined data center, and apply network virtualization and micro-segmentation to the network. It empowers infrastructure architects to react quickly to prevent breaches.
Build a fundamentally more agile, efficient and secure application...
Discover how micro-segmentation, delivered through network virtualization, provides comprehensive data center security, accelerates delivery time, and enhances the agility of your data center. Download the eBook here.
Build a fundamentally more agile, efficient and secure application environment with VMware NSX...
This handy guide highlights some of the key benefits of securing your data center from within using micro-segmentation. Get started now.
Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization featuring Intel® Xeon® processors and Intel® Ethernet...
Will LaSala, Director of Services at VASCO, discusses lessons learned from the Pokemon Go craze about detecting and responding to jailbreaking and rooting attacks against mobile applications.
When an organization suffers a data breach, how can it quantify the total of all the associated costs? The scope of costs goes way beyond a fixed dollar value per stolen record and extends to include legal fees, third-party forensic services, loss of reputation and defense improvement, as well as state and federal...
Google Project Zero researcher Tavis Ormandy has once again found major vulnerabilities in Symantec's security products. Symantec has released updates, but not all will install automatically - some vulnerable products must be manually updated.
With attackers getting more sophisticated every day, manual methods
of locating and testing web-based apps are no longer enough. The
right Web Application Scanning (WAS) solution can help you
systematically: discover web apps running in your network, determine
whether or not they are vulnerable to attack,...
When web applications are breached, enormous amounts
of sensitive business data can be lost.
These types of attacks can occur at organizations
of all sizes and levels of IT sophistication, and can
affect tremendous amounts of data.
Web applications are popular targets because they are accessible to almost...
Apple has removed from its App Store a $0.99 security tool developed by well-known researcher Stefan Esser that he says could quickly detect if an iPhone may have been hacked. What is the back-story behind this move?
Verizon's annual Data Breach Investigations Report has triggered an avalanche of criticism that researchers made critical errors when studying and reporting on the top 10 most frequently exploited software vulnerabilities.
The notion of API management in which enterprise architects, app developers and IT security experts work in harmony is great in theory. The reality, according to new research from Ovum, is much more scattered.
It's been a half-year now since Art Gilliland stepped into the role of CEO at startup security company Skyport Systems. What lessons has he learned from the marketplace, and where does he expect Skyport to make its mark? Find out in this video interview.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.