Search results for: “threat intelligence”
-
How to Hire an Ethical Hacker
By Ryan O’Leary, WhiteHat Security If your company develops web applications, I hope you aren’t the nervous sort when I tell you that your website…
-
48 Percent of Companies Don’t Inspect the Cloud for Malware
A recent survey of 643 IT and IT security practitioners in the U.S. and Canada found that fully 48 percent of respondents don’t inspect the…
-
How to Bake Better Security into Applications
Developers are being urged to create applications at an ever-faster pace, with many of them designed to operate on the Web or run on mobile…
-
How to Avoid a Hacktivist Attack
Last year saw a massive surge in hacktivism – hacking motivated by political and social objectives – according to Verizon’s 2012 Data Breach Investigations Report…
-
How Does Biometric Authentication Work?
Have passwords outlived their usefulness? Take a look at some of the weak passwords exposed in website breaches this year, and judge for yourself. The…
Latest Articles
Popular Categories
- Applications (99)
- Artificial Intelligence (1)
- Cloud (79)
- Compliance (35)
- Cybersecurity (35)
- Endpoint (74)
- Mobile (41)
- Networks (341)
- News (25)
- Products (368)
- Security (1)
- Sponsored (1)
- Threats (353)
- Trends (201)
- Video (17)