Category Archives: IT Security

Secure Web Gateway as a Service: Simplifying the Path to Network Security

  Software as a service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS) are just a few of the now commonplace solutions that have been born through the cloud. Rather than forcing companies to expend resources on deploying and maintaining certain IT functions, “as-a-service” products can be leveraged […]

Read More

Choosing a cybersecurity solution – 11 key points to consider

Choosing the right cybersecurity solution is challenging. You need to protect your organization from increasingly sophisticated threats, but you don’t want to consume valuable IT resources with complex management and reporting requirements. In a crowded vendor landscape, how do you find the most effective security for your organization? Read this […]

Read More

Spotlight on Cloud Security

Learn the 9 most pressing cloud security liabilities and how IT can deal with them. While the cloud is becoming an underlying assumption of computing, often public cloud services present problems for IT that business managers fail to think through, especially security implications. This paper covers: Cloud security liabilities Identity […]

Read More

Exploit Kits: Cybercrime’s Growth Industry

If you’ve had the sense lately that cyber traps are everywhere, just waiting for your users to open an infected document or click a compromised URL, you would be justified. Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third party applications installed on […]

Read More

Downtime and Data Loss: How Much Can You Afford?

Learn the importance of establishing recovery time and recovery point objectives when planning a business continuity strategy. Aberdeen recently conducted a survey of IT professionals focused on the plans and processes that organizations adopt for continued business operations and recovery in case of a disaster. Download this Analyst Insight to […]

Read More

Modern Web Application Firewalls Fingerprinting and Bypassing XSS Filters

Web applications continue to be a primary attack vector for cyber-crimes, and the charts show no sign of abating. Vulnerabilities in web applications are a target and can be attributed to many problems and can damage a company. This means poor input validation, session management, insecure, system settings configured incorrectly […]

Read More

HITB Magazine – SVFORTH: A Forth for Security Analysis and Visualization

In this issue of HITB Magazine, you will find information on network security, database security, application security, computer forensics, computer security and mobile security. Also included in this issue are the following articles: Practical Attacks Against Encrypted VoIP Communications Hunting for OS X Rootkits in Memory Dynamic Tamper – Evidence […]

Read More

HTML 5 Modern Day Attack And Defence Vectors

Learn about the flaws of HTML5 and the recommended security measures that could be taken to minimize the impact of HTML5 vulnerabilities. HTML5 has gained a lot of popularity because it allows web application developers to build more interactive websites thanks to a number of new features. However, new features […]

Read More

An Introduction To Keyloggers, RATS And Malware

In this book you will learn about various types of Malware, Keyloggers and Rats. You will also read about how hackers can use these keyloggers, rats and viruses to infect your computer or to control your PC to steal sensitive information such as username, password, credit card information etc. Rafay […]

Read More

Hacker Monthly — Bitcoin — The Internet of Money

Hacker Monthly is a print magazine version of Hacker News, a social news website wildly popular among programmers and startup founders. This issue of Hacker Monthly features two articles on Bitcoin — one is an informative piece on understanding Bitcoin, and the other is a technical overview of how to […]

Read More

Have You Adopted The SANS Top 20 Critical Security Controls?

Learn how Splunk software is uniquely suited to support these critical security controls. If you’ve considered or adopted the SANS Top 20 Critical Security Controls, Splunk software can help you operationalize and simplify bringing together the disparate data needed to monitor, report and alert on these critical controls.Splunk software has […]

Read More

Detecting Insider Threats

How Splunk software is used to safeguard financial data. Financial institutions increasingly rely on outside contractors to program and maintain applications, manage projects, and perform analyses and assessments. The security teams at a major North American bank struggled to effectively monitor these contract employees, hampering the team’s ability to detect […]

Read More

Your Complete Guide to Windows Customization

By downloading this free guide, you agree to receive regular updates on the latest cool apps, product reviews, and giveaways from MakeUseOf. You can create a Windows desktop environment that not only accommodates your needs, but also looks stunningly beautiful.  If you’re anything like me, when you start to use […]

Read More

Heartbleed — What Can You Do To Stay Safe?

By downloading this free guide, you agree to receive regular updates on the latest cool apps, product reviews, and giveaways from MakeUseOf. As a result, all manner of personal and financial information could be at risk.  The Heartbleed SSL vulnerability is making headlines around the world – and misreporting in […]

Read More

Security for E-Signatures and E-Transactions

Discover how to build effective, end-to-end security around your business tractions with electronic signature security. What is electronic signature security, and why is it important? What security is needed, and how much? How and when to apply security to electronic signatures, transactions and records? What techniques and methodologies will ensure […]

Read More

Web Application Defender’s Cookbook: Battling Hackers and Protecting Users–Free Sample Chapter

Defending your web applications against hackers and attackers. The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this […]

Read More