e com security solutions

­

Latest Report Points to a 45% Increase in Web Application Attacks

A few weeks back Alert Logic released their latest cloud security report. The report highlights the current rise in web application attacks. In short it states “‘Businesses with a large volume of online customer interactions are targeted for web application attacks in order to gain access to sensitive customer & financial data". This 45% increase [...]

Identifying open ports – An important step to securing your perimeter

Locking the doors and windows to your house won’t stop someone from getting in if they are really determined. However, it is still a lot harder than opening an unlocked door or window. Breaking into a locked house, takes a lot more time and typically when someone forces their way in, they are bound to [...]

January 11th, 2016|Network Security|

Vulnerabilities in the headlines: 2015

Linux Kernel Vulnerability and how to fix it A flaw in the Linux Kernel has made big news lately, labelled as a local privilege escalation vulnerability. In fact, the company ‘Perception Point’ which released news of the flaw is under criticism as after reporting it to the Linux kernel maintainers, who were then developing a [...]

January 8th, 2016|Cyber Security|

Security Scorecard Survey Shows Retail Seriously Under performing in Web Application Security

While not being in the worst performing sector for security, retail is one of the biggest targets for attackers and a number of breaches hit the headlines in 2015, the most well known being chain store Target. As retailers process a large volume of payments, they are an obvious target for the theft of financial [...]

Pavankumar Bolisetty Wins “Top CISO of the Year” Award, 2015

'Top CISO Awards' will felicitate organizations (and the people within them) that are using information security technology in innovative ways to secure their business and mission critical information in the most effective manner and deliver business value, by creating competitive advantage, optimizing business processes, enabling growth or improving relationships with customers. Information security is vital for [...]

July 25th, 2015|news|