Tag "Software Security"

Back to homepage
Software

Two Elasticsearch Databases Found Unprotected

After news broke that an Elasticsearch server belonging to several online casinos was left without a password, independent security researcher Bob Diachenko discovered another unprotected Elasticsearch database from AIESEC, a global, youth-run nonprofit. Click

Software

What sets visionary businesses apart? Running multiple digital initiatives at scale

Organisations can take a giant leap by partnering within their ecosystems to gain access to complementary skills and resources.What does it take to succeed in digital transformation? What does it take

Software

What is spear phishing? Why targeted email attacks are so difficult to stop

A highly targeted form of phishing, spear phishing involves bespoke emails being sent to well-researched victims. It is hard to spot without close inspection and difficult to stop with technical

Software

Malware Evades Detection One Step at a Time

Malicious code was lurking about in two different apps within the Google Play store, according to researchers at Trend Micro who have disclosed that they discovered a banking Trojan in what seemed

Industry Insights

New requirements for the secure design and development of modern payment software

The PCI Security Standards Council (PCI SSC) published new requirements for the secure design and development of modern payment software. The PCI Secure Software Standard and the PCI Secure Lifecycle (Secure SLC)

Software

Mining malware evades agent-based cloud security solutions

Cloud infrastructures are a growing target for threat actors looking to mine cryptocurrency, as their vast computational power allows them to multiply the mining malware’s effect. Keeping its presence from being noticed

Software

6 Best Practices For Increasing Security In AWS In A Zero Trust World

Enterprises are rapidly accelerating the pace at which they’re moving workloads to Amazon Web Services (AWS) for greater cost, scale and speed advantages. And while AWS leads all others as

Software

Encryption is key to protecting information as it travels outside the network

A new Vera report reveals stark numbers behind the mounting toll of data breaches triggered by cybercrime and accidents. One of the most recognized and mandated security controls, installed encryption tools protect

Software

Accessibility Trumps Security in the Battle Between Authentication Alternatives

A new Ping Identity survey has revealed that simplicity wins out over security when it comes to authentication. Respondents to our recent survey knew what provided better security, but continued

Hardware/Network

Hyperconverged infrastructure – is healthcare ready?

In over 30 years of healthcare IT experience, there has been at least one constant: the need to deliver solutions quickly and more cost effectively.This requirement has only escalated over