The Risks Associated with Third-Party Software Components

I was recently contacted by a colleague in an information security leadership position who was concerned about his developers using some third-party plug-ins for an enterprise application they were rolling out. His developers wanted to install these third-party components in order to speed up their development work. Sounds like a reasonable thing to do. However, […]

Read More →

Is Your Security Appliance Hackable?

In the late 90’s, businesses embraced the internet; they connected their networks and servers to the internet so their data can be accessed from anywhere around the world. This was a new era that gave businesses the opportunity to grow globally and reach new audiences. By doing so, their networks, servers and data were also […]

Read More →

Logical and Technical Vulnerabilities – What they are and how can they be detected?

Web vulnerabilities can be split into two distinct groups; Technical Vulnerabilities and Logical Vulnerabilities. Technical vulnerabilities can be found by using automated processes, such as scanning a website with a web vulnerability scanner. On the other hand, logical vulnerabilities can only be detected manually. This article explains the difference between technical and logical web vulnerabilities […]

Read More →

There’s no Guarantee of Security

When it comes to the web, there’s never a guarantee of complete security. In fact, a clean bill of health doesn’t mean you truly have a clean bill of health. Similar to how a blood test or MRI scan cannot possibly find all health-related problems in our bodies, there’s no true way to find every […]

Read More →