dcsimg

Applications - Article Archives - Page 1

How to Control API Security Risks

November 15, 2018 |

Plugging critical vulnerabilities and using API security products are the best ways to manage API security risks.

READ MORE

Privileged Access Management (PAM): Controlling a Critical Cybersecurity Risk

November 14, 2018 |

Privileged accounts have access to your most important data, so why not protect them with a PAM solution? Here's everything you need to know.

READ MORE

Think Like a Hacker: An Offensive Approach to Enterprise Security

October 15, 2018 |

Find out how the CISO of an infamously breached website uses an Offensive Risk Management approach to improve the security of his organization.

READ MORE

The IT Security Mistakes that Led to the Equifax Breach

September 17, 2018 |

Patching failures alone didn't lead to the massive data breach at Equifax. Here are a half-dozen other mistakes that Equifax made that IT security teams should learn from.

READ MORE

Application Security: How to Secure the Many Apps in Your Enterprise

September 12, 2018 |

These measures can help organizations find and fix security vulnerabilities in applications, whether the apps come from third parties or are developed in-house.

READ MORE

Protecting Against the 7 Vulnerabilities of Meltdown and Spectre

September 10, 2018 |

The biggest security vulnerabilities of 2018 are the Meltdown and Spectre flaws. What are they and what should you do to keep your organization safe?

READ MORE

5 Tips for Managing Privileged Access

September 06, 2018 |

Some accounts are more valuable than others. Privileged access management (PAM) can help secure them.

READ MORE

How Blackberry Does Secure Release Management

August 09, 2018 |

In a Black Hat USA session, BlackBerry's Product Security Operations Team director explained how organizations can improve their software release process to reduce vulnerabilities.

READ MORE

With So Many Eyeballs, Is Open Source Security Better?

July 10, 2018 |

VIDEO: Dirk Hohndel, VP and Chief Open-Source Officer at VMware, talks about how dev security should  be done, whether the code is open source or proprietary.

READ MORE

Container and Kubernetes Security: It's Complicated

June 13, 2018 |

While there are a lot of things that containers do to help improve security, there are still some missing pieces.

READ MORE

10 Security Projects CISOs Should Consider: Gartner Analyst

June 12, 2018 |

And 10 they should have already done.

READ MORE

An Inside Look at OpenStack Security Efforts

June 01, 2018 |

OpenStack is a widely deployed open-source cloud platform, but isn't necessarily secure by default. Learn what leading OpenStack experts said is needed to help make your cloud secure.

READ MORE

How the Kubernetes Security Response Team Works

May 11, 2018 |

VIDEO: Brandon Philips, former CTO of CoreOS, talks about how the Kubernetes security team works and responds to vulnerability reports.

READ MORE

Key Steps for Optimizing POS Security

May 09, 2018 |

It's not just about PCI DSS compliance – here are the three most important factors in a POS security solution, plus other things you can do to avoid credit card breaches.

READ MORE

Critical Security Configuration Issue Affects All SAP Implementations

April 27, 2018 |

The flaw is driven by a security configuration initially documented by SAP over a decade ago.

READ MORE

Does Your Browser Block Cryptojacking Attacks?

March 29, 2018 |

Learn what you can do to limit the risk of in-browser cryptojacking attacks.

READ MORE

Types of Firewalls: What IT Security Pros Need to Know

March 21, 2018 |

Next-gen firewalls, UTMs, web application firewalls, cloud-based firewalls, container firewalls and more: Everything you need to know about firewalls.

READ MORE

Email Security for Your Business

March 13, 2018 |

Every business uses email, yet many are unaware of email security threats. Here's what to worry about – and what to do about it.

READ MORE

How to Defend Servers Against Cryptojacking

February 28, 2018 |

Learn how to take proactive steps to help mitigate the risk of becoming an unwitting accomplice to cryptojacking attack.

READ MORE

9 Top Secure Web Gateway Vendors

February 15, 2018 |

A look at top vendors in the market for web security gateway solutions, a critical tool for defending against web threats.

READ MORE