Web security is complicated enough. Adding a healthy dose of politics, like what exists in most organizations, often proves to be more than IT professionals can handle. Most problems in life are either financial, health, or people-related. It’s the people part of the equation in…
Why you should be Concerned about Web Security
Ever since the Heartbleed bug disaster, you’d think companies are becoming more vigilant with their web security plan. Recent events seem to show evidence to the contrary, with millions of users’ data left exposed to cyber-attacks on popularly used websites, including a government website and…
Analysis of an Intrusion: Backdoors
The concept of “Backdoor” has seen many interpretations during the relatively short history of the Internet. Microsoft defines Backdoors as “A hidden entrance to a computer system that can be used to bypass security policies”, and, in essence, that is what they are. A Backdoor…
Core Causes of Web Security Risks and What You Can do About Them
Samuel Johnson, an 18th century lexicographer, once said “The chains of habit are too weak to be felt until they are too strong to be broken.” That’s precisely what we’re seeing with web security today. We get caught up in our day-to-day work and the…
Vulnerable Network Devices: A Growing Concern
Network devices, except maybe firewalls, are not usually perceived as security sensitive assets. Manufacturers and users do not invest time in assessing the security state of routers and switches. IT admins, handling business IT infrastructures, are mainly concerned with uptime when it comes to network…
What You Don’t Know About Web Security CAN Hurt You
How secure is your web environment? You know, your business’ marketing website, your customer-facing web applications, your internal financials application, the various cloud services that process and store business assets, and so on. Many business executives don’t have the slightest idea about the security of…
The Results are in – Verizon 2014 Data Breach Investigations Report
The numbers are in… and cybercrime had quite an active 2013 according to Verizon’s 2014 Data Breach Investigations Report (DBIR) – one of the information security industry’s most prominent studies compiled from over 50 contributing organizations. This year’s report includes an array of security issues,…
Key Web Application Security Metrics
How’s your web application security program measuring up today? If you’re like many people, you’re simply going through the motions of periodic vulnerability scans and problem resolution. It’s a vicious cycle that may or may not be delivering the results you’re looking for. Given all…
Danger: Open Ports – Trojan is as Trojan does
Open ports are the doorways to your secure perimeter. Behind open ports, there are applications and services listening for inbound packets, waiting for connections from the outside, in order to perform their jobs. Security best practices imply the use of a firewall system that controls…