Spot a Phishing Attack

  Smart companies know the best offense against security threats is a strong defense. And what type of defense is the most successful, you ask? Educating Employees! A stunning 91% of data breaches start with employees, making it essential for organizations to educate all employees on the threats associated with today's online world. [...]

2025-03-03T08:04:47+00:00March 21st, 2016|Cyber Security, Network Security, Security Awareness|

The costs of security bugs and why penetration testing can help

A report accompanied with a rating taxonomy aimed to help researchers and customers to determine appropriate payouts for bugs found by researchers in bug bounty programs has recently been released by Bugcrowd. These tools, especially the Vulnerability Rating Taxonomy (VRT), which details a number of vulnerabilities, classified by severity, are not only useful in the [...]

2025-03-03T08:05:30+00:00March 17th, 2016|Web Application Security|

A Simple Explanation of Cross Site Scripting

Cross-site scripting (XSS) is a security vulnerability allowing a user to alter the code that an application delivers to a user which is executed in the user’s web browser. It is most commonly found in web applications affecting the user's browser, but also possible in other applications with embedded web content, such as an interactive [...]

2025-03-03T08:04:42+00:00March 11th, 2016|Cyber Security, Web Application Security|

Cybersecurity National Action Plan: Obama Outlines Plans to Spend $19 billion on Cybersecurity

On February 9th President Obama announced the Cybersecurity National Action Plan, including steps such as establishing a cybersecurity commission, introducing new safeguarding measures and supporting both companies and consumers in strengthening their own security. He’s also put the money where his mouth is and backed this up by reserving $19billion of spending to implement the [...]

2025-03-03T08:04:00+00:00February 19th, 2016|Cyber Security|

The Importance of Finding All Vulnerabilities on Your Web Applications

Many businesses understand that it’s important to properly manage their web application security. But in truth, it goes far beyond the need to simply “avoid being hacked”. There are often serious liabilities associated with the failure to properly manage your security. Unfortunately, many of those liabilities are an afterthought. Until of course, there is a [...]

2025-03-03T08:04:30+00:00January 26th, 2016|Cyber Security, Web Application Security|

Latest Report Points to a 45% Increase in Web Application Attacks

A few weeks back Alert Logic released their latest cloud security report. The report highlights the current rise in web application attacks. In short it states “‘Businesses with a large volume of online customer interactions are targeted for web application attacks in order to gain access to sensitive customer & financial data". This 45% increase [...]

2025-03-03T08:04:36+00:00January 13th, 2016|Cyber Security, Web Application Security|

Identifying open ports – An important step to securing your perimeter

Locking the doors and windows to your house won’t stop someone from getting in if they are really determined. However, it is still a lot harder than opening an unlocked door or window. Breaking into a locked house, takes a lot more time and typically when someone forces their way in, they are bound to [...]

2025-03-03T08:04:07+00:00January 11th, 2016|Network Security|

Vulnerabilities in the headlines: 2015

Linux Kernel Vulnerability and how to fix it A flaw in the Linux Kernel has made big news lately, labelled as a local privilege escalation vulnerability. In fact, the company ‘Perception Point’ which released news of the flaw is under criticism as after reporting it to the Linux kernel maintainers, who were then developing a [...]

2025-03-03T08:03:52+00:00January 8th, 2016|Cyber Security|

Security Scorecard Survey Shows Retail Seriously Under performing in Web Application Security

While not being in the worst performing sector for security, retail is one of the biggest targets for attackers and a number of breaches hit the headlines in 2015, the most well known being chain store Target. As retailers process a large volume of payments, they are an obvious target for the theft of financial [...]

2025-03-03T08:04:21+00:00January 4th, 2016|Cyber Security, Web Application Security|

Pavankumar Bolisetty Wins “Top CISO of the Year” Award, 2015

'Top CISO Awards' will felicitate organizations (and the people within them) that are using information security technology in innovative ways to secure their business and mission critical information in the most effective manner and deliver business value, by creating competitive advantage, optimizing business processes, enabling growth or improving relationships with customers. Information security is vital for [...]

2016-12-31T05:14:49+00:00July 25th, 2015|news|
Go to Top