Results for Attack

Exabeam’s Extensible UBA Supercharges Enterprise Security via Integration, Partners

As 2016 kicks off, User Behavior Analytics (UBA) will be a hot area for security investments, according to Gartner analysts. The reason: UBA can deliver big security results, especially when integrated with other security solutions. IDN looks at Exabeam UBA, and the company’s program to forge wide-ranging partnerships with Exabeam’s Rick Caccia.

Full Story >

Ravello, SimSpace Use Virtualization To Create True-To-Life CyberSecurity Simulations

Ravello Systems and SimSpace Corp. are partnering on an easy to use cloud-based way to create simulated cyber attacks – and test the effectiveness of defenses, responses – and even IT skills.

Full Story >

ControlScan, iScan Online Join Forces to Enhance Mobile Device Security

Payment security and compliance solution provider ControlScan is teaming with iScan Online to address the security issues small to midsize businesses (SMBs) face when employees use their own mobile devices for work. They have launched ProTect Mobile, a tool they can use to secure Apple iOS and Android mobile devices.

Full Story >

Qualys, SANS Launch Free Cloud Service to Halt Top Cyberattacks

Qualys Inc. has teamed up with the SANS Institute and the Council on CyberSecurity on a free service to help enterprises implement the Top 4 Security Controls Cloud Service to ward off cyberattacks. The ‘Top 4’ cybersecurity service helps businesses identity top security threats from Windows PCs, and make sure controls are implemented.

Full Story >

Lookingglass Updates Cyber Security for Enterprise, Cloud

Cybersecurity company Lookingglass Cyber Solutions is shipping an alert and warning system to suppress threats and protect against network vulnerabilities to enterprise networks as well as to Internet-based connections to partners and providers.  The company’s Cyber-Heads-Up-Display (CyberHUD) works with Lookingglass’ appliance-based ScoutVision and cloud-based CloudScout products.

Full Story >

McAfee Updates Platform Approach to Enterprise-Caliber Cloud Security

McAfee is shipping an update to its three-pronged approach to cloud security, which aims to let companies extend and optimize their current security and policy enforcements to the cloud. McAfee’s Cloud Security Platform provides a framework-based approach to cloud security that allows IT to more easily address vulnerabilities across identity, web and email systems.

Full Story >

Avoid Top 5 Web Service Security Flaws

The "Top 5" threats list for web services notes that many vulnerabilities arise from some common practices -- including the use of open or standards-based technologies. Learn how XML parsing and WSDL publishing can open up your business to attacks, and get some expert tips for avoiding security holes.

Full Story >

Expert Tips for Securing Web Services

The lead author of one of the most comprehensive books on web services security offers some key tips for designing and deploying security for enterprise-based web services projects. Devs should prep for attacks on their SQL, directory and URL strings. Take a look.

Full Story >

Top 5 Web Service Security Flaws Identified

There is a new Top 5 threats list for web services. Surprisingly, many vulnerabilities come from open or standards-based technologies. Prepared by web services researcher Spire Security LLC and Forum Systems, a web service security provider of Web services-related threats. See how XML parsing and WSDL scanning can impact the security of your web service project.

Full Story >

Top 5 Web Service Security Flaws Identified

There a new Top 5 threats list for web services. The report was prepared by web services researcher Spire Security LLC and Forum Systems, a web service security provider. Many of the threats will sound familiar to long-time web-based developers, but see how XML parsing and WSDL scanning can impact the security of your web service project.

Full Story >

'Slammer' Heightens Focus on Securing Web Apps

The outbreak in Asia of a rapidly spreading computer worm is the most aggressive assault on the Internet backbone since July 2001's "Code Red." The attack comes just as an international user group has issued its Top 10 Watchlist for how to keep web-based applications secure. Get the latest on the 'Slammer' and an in-depth summary on how to make sure your web apps are secure.

Full Story >

<< Start < Previous 1 Next > End >>
Showing 1 - 11 of 11

Videos

When Bots Attack! Stopping OWASP's New Top 20 Automated Threats



  • Rami Essaid - CEO & Co-founder