Tag "Application Security"

Back to homepage
Software

How to master your passwords on all your devices

Although tech companies have long been predicting the death of the password, it seems as if we’re stuck with that as our main way of securing sites and software for

Software

Four Ways to Mitigate Cyber Risks for ERP Applications

Security Teams Can Shift the Risk/Reward Ratio and Make ERP Applications Less Attractive Targets. A confluence of factors is putting hundreds of thousands of implementations of Enterprise Resource Planning (ERP)

Hardware/Network

What Tesla’s Spygate Teaches Us About Insider Threats

The saga involving a malicious insider at Tesla keeps getting stranger. Already there have been several fascinating twists and turns, well-chronicled in the press and on social media. Whatever the truth is,

Hardware/Network

8 Big Processor Vulnerabilities in 2018

Since the Spectre and Meltdown vulnerabilities knocked the glow off of the new year, 2018 has been the year of the CPU bug. Security researchers have been working in overdrive

Software

Blockchain: Only As Good As Its Data

Blockchain has without a doubt created a lot of discussion as the next big thing, especially in supply chain. Before blockchain can become the next tech blockbuster, there are several

Hardware/Network

Is a UTM Appliance the Right Security Solution for Your Business?

A unified threat management device, or UTM security appliance, can provide a comprehensive and easily managed security solution for small and mid-sized organizations at reasonable cost. UTM appliances provide an

Cloud

Departing Employees Should Not Mean Departing Data

Empowering your employees to do their best work means providing them access to physical and digital assets in the company network that can help them scale their initiatives. But when

Hardware/Network Software

Organizations Operating in the Digital World Need Multiple Layers of Defense

If cyber attacks seem to be escalating, it’s because they are. Every day seems to bring news of yet another major data breach, and increasingly it’s happening to to big

Software

12 Quick Ways to Secure Your Personal Data

Think about the many places your personal data lives – the documents that contain it, the businesses collecting it, the devices storing and sharing it, the websites and apps using

Software

Four common API vulnerabilities and how to prevent them

Proper security measures are one of the most important aspects of building an application programming interface, or API. It’s great for an API to connect systems and give developers access