HackDig : Dig high-quality web security articles for hacker

A Fresh Approach to Perimeter Protection: Application Isolation

Detection-based IT security solutions have never worked, and will never work. More security layers is not the answer, but smarter layers can work. Shift your mindset from “prevent, detect, and respond” to “isolate, contain, and control.” Layer after layer of security is not stopping breaches. We can’t keep the bad guys out. Oddly enough, 80+ years ago we l
Publish At:2017-11-07 13:06 | Read:65 | Comments:0 | Tags:Company News application isolation applications data segemen

Three Practical Tips That Empower Developers and Prevent Open Source Security Risks From Entering Your Code

Employees use open source applications in organizations of all sizes and across all industries, and this trend shows no signs of slowing down. It is both cost effective and efficient to incorporate source code into software during the development stage. With all those extra resources, developers can focus more on the organization’s proprietary code. Ac
Publish At:2017-08-21 15:05 | Read:4060 | Comments:0 | Tags:Application Security Risk Management Application Development

The Promise of a Unified App Catalog for the Enterprise

Applications can improve the way we get through the day. There are apps for shopping, getting to your next destination, staying abreast of the latest news, keeping in touch with loved ones — no matter what you need, chances are there’s an app for it. It’s no different for enterprises. Apps have helped revolutionize entire industries and have beco
Publish At:2017-07-11 15:55 | Read:4587 | Comments:0 | Tags:Application Security Endpoint Mobile Security Apple Applicat

Know Your Apps: Explore the IBM Security App Exchange Ecosystem for Collaborative Defense

Collaboration, integration and teamwork are jargon you might hear daily in your professional life. We strive to collaborate with our colleagues, family and friends to achieve our personal goals and share expertise. In 2015, IBM Security took this collaborative approach to the next level by launching the IBM Security App Exchange, a marketplace for the secur
Publish At:2017-05-03 13:10 | Read:3951 | Comments:0 | Tags:Security Intelligence & Analytics Threat Intelligence Applic

The Economist on the Cyber Security Industry

A recent copy of the Economist caught my eye with the front page headline of “Why computers will never be safe”. For a non-technical publication they have managed to give some great insight into the reasons why the security industry has a problem. The article calls out how profitable it is for hackers to exploit a vulnerability, and how high tech companies
Publish At:2017-05-01 08:20 | Read:4091 | Comments:0 | Tags:Breaking News application isolation applications Economist H

10 Application Security Testing Resources You Should Master and Share With Your Executive Team in 2017

Application Security Testing Takeaways From 2016 In my current role, I have the pleasure of routinely hearing our clients’ direct feedback regarding the application security issues they face. Across the board, they consistently refer to three main areas of concern: Securing executive buy-in and funding for major IT initiatives; Spending most of their
Publish At:2016-12-16 21:06 | Read:5126 | Comments:0 | Tags:Application Security Mobile Security Risk Management App Sec

IP was Middle School, Named Data Networking is College

Much of the Named Data Networking (NDN) project codebase is still at the Version zero-dot-something level. But things are nevertheless starting to get real for this content-centric architecture designed to blast past today’s host-based and point-to-point Internet scheme to one more suited for accessing applications across hugely scalable networks that ar
Publish At:2015-10-08 20:25 | Read:3609 | Comments:0 | Tags:Network Management Router Security Applications Internet of

Secunia acquired by Flexera Software

Secunia, the company specializing in software vulnerability management, has been acquired by software asset management company Flexera Software.The pairing of Flexera's asset discovery and management tools with Secunia's software vulnerability platform will give organizations the ability to thoroughly assess the security of applications discovered on the net
Publish At:2015-09-15 21:35 | Read:3404 | Comments:0 | Tags:Security Applications Mergers and Acquisitions IT Industry

The Upload: Your tech news briefing for Wednesday, July 22

Carmakers emerge winners in the bidding for Nokia HereNokia’s much-sought-after mapping assets, called Here, have apparently been won by a coalition of carmakers. Audi, BMW and Daimler will jointly purchase Nokia’s Here digital mapping service for roughly $2.7 billion, and they plan to invite other auto makers to take a stake in the company as well, multiple
Publish At:2015-07-23 00:15 | Read:3700 | Comments:0 | Tags:Enterprise Software Applications Security Gadgets Consumer T

The Upload: Your tech news briefing for Friday, July 10

Power to the people: Facebook news feed tool lets users prioritize postsDespite all that it knows about us, Facebook has conceded that it can’t do such a good job of guessing which items we’d like to see in our news feeds. It’s adding a tool that will let users pick the content they see first. It’s a minor victory for users who want to wrest control from alg
Publish At:2015-07-10 17:56 | Read:3174 | Comments:0 | Tags:Enterprise Software Applications Desktops Hardware Internet

Study Finds 70% of Mobile Banking and Retail Apps Vulnerable to Attacks Like Heartbleed

A recent study has revealed seven out of ten retail and financial applications are vulnerable to Heartbleed-like attacks due to input validation violations.Software testing company CAST performed the research in an effort to show the growing number of data breaches and security incidents can be directly linked to poor code quality, according to a press relea
Publish At:2014-08-28 07:30 | Read:3931 | Comments:0 | Tags:Top Security Stories applications CAST Heartbleed mobile sec

New Variant of Bugat Malware Borrows Lucrative Gameover Zeus Techniques

Only two months have passed since the international joint operation to bring down the Gameover Zeus (GOZ) botnet. In a combined effort, law enforcement and service providers were able to disrupt the botnet operation and apprehend several of those responsible. The GOZ malware was known for its peer-to-peer-based (P2P) infrastructure, large number of infected
Publish At:2014-08-14 18:10 | Read:3338 | Comments:0 | Tags:Malware Applications banking botnet Bugat Malware Cridex Feo


Share high-quality web security related articles with you:)


Tag Cloud