Back to homepage

Making Network Security DevOps Friendly

DevOps is all about agility, with fast, short delivery cycles and automation for software development and applications. Enabled by recently-introduced technologies such as virtualization, cloud and SDN, spinning up new

How to master your passwords on all your devices

Although tech companies have long been predicting the death of the password, it seems as if we’re stuck with that as our main way of securing sites and software for

Moving beyond passwords: The new era of authentication

Businesses are questioning the centrality of passwords as a test of identity. With cyber-attacks on the rise at an alarming rate, simple password-based security measures are no longer fit for

Four Ways to Mitigate Cyber Risks for ERP Applications

Security Teams Can Shift the Risk/Reward Ratio and Make ERP Applications Less Attractive Targets. A confluence of factors is putting hundreds of thousands of implementations of Enterprise Resource Planning (ERP)

The Enigma of AI & Cybersecurity

We’ve only seen the beginning of what artificial intelligence can do for information security.  Alan Turing is famous for several reasons, one of which is that he cracked the Nazis’

Keep Your Personal Brand’s Website Safe From a Cyber Attack

Your personal brand’s website is your calling card to attract loyal followers —an unexpected cyber attack can cost you both time and money.  What types of activity are you currently

Enterprises as modern software factories: Infusing security throughout the app dev process

The DevOps methodology is ready to take the next step in its evolution. The first instance incorporated an operational approach to application development to create in-house, custom apps in a fast-paced, iterative

What is malware? Viruses, worms, trojans, and beyond

What are the types of malware? How can you prevent, detect, or remove it? We’ve got answers. Malware—a blanket term for viruses, worms, trojans, and other harmful computer programs—has been

The real-life consequences of cryptocurrency hoarding

Ever since the Bitcoin boom, cryptocurrency has become a global phenomenon, and it’s here to stay. Unlike fiat currencies, cryptocurrency isn’t regulated by a central bank or government. Consequently, anyone

Over 20 Flaws Discovered in Popular Healthcare Software

Multiple vulnerabilities in a popular healthcare software provider’s products may have put at risk the data of over 90 million patients. OpenEMR develops open source electronic health record (EHR) and