Apache Struts Makes a Comeback
Apache Struts is a critical remote code execution vulnerability affecting Struts newer versions of 2.3.5 – 2.3.31 and Struts 2.5-2.5.10.
Three Key Elements for Integrating Security with Automated Microsoft Azure Deployments
Although there is no established framework that covers security for DevOps, we have outlined three key elements for integrating security with automated Microsoft Azure deployments.
Microsoft Azure Cloud Usage is Growing – Don’t Forget About Security
Are your Microsoft Azure workloads secure? Learn tips and view resources that will help you ensure that your Azure cloud is protected.
3 New Year’s Resolutions That Every CISO Should Make
Optimize your security with three resolutions that every CISO should make to guide your efforts to staying secure in the cloud.
The Top 8 Data Security Best Practices to Protect Against a Successful Breach
Proactively evaluating and improving your existing cybersecurity strategy based on a comprehensive approach across pre-breach and post-breach risks can significantly reduce your likelihood of being affected by cybercrime. Here are 8 data security best practices that can significantly reduce the likelihood of a successful attack and minimize the impact of those that are successful.
The Cyber Kill Chain: Understanding Advanced Persistent Threats
Learn the tools, tactics, and procedures used in each of the 5 Cyber Kill Chain stages of an Advanced Persistent Threat (APT) attack.
Want the Best Data Security? Go Cloud.
Contrary to common belief, moving to the cloud is more secure than ever with the shared responsibility model.
Why Vulnerability Management is Important
An organization must stay ahead with a solid vulnerability management program early in the game. If you don’t, you may end up with unmanageable risks and forcing you to make even more expensive decisions down the road.
Should You Invest in a SOC?
The benefits of a SOC are numerous; however, building a SOC is costly in both time and expense. Learn about the process involved with building a SOC or choosing a managed security services solution.
Vulnerability Management in the Cloud: A Fresh Approach
Whether you are running a server under your desk or have hundreds of servers at data centers around the world, you know that you need to make sure your data and applications are protected from hackers trying to exploit known vulnerabilities.
Where is IPv1, 2, 3,and 5?
While researching IPv6, I decided it would be a good exercise to tell the short, but interesting story about IPv5. Now the Internet Protocol (IP) was not originally designed as a method of managing addresses on networks; it was intended as a technology to split the original network stack with Transmission Control Protocol (TCP) at layer four and IP at layer three.
Internet Information Server (IIS) Exploitation
IIS is a web server application and a set of feature extension modules created by Microsoft for use with Microsoft Windows.