Email Alerts
-
Remediation planning for Ruby on Rails security vulnerabilities
The recent Ruby on Rails security vulnerabilities can be patched. Expert Michael Cobb discusses the fallout and offers help with remediation planning. Tip
-
Defending against watering hole attacks: Consider using a secure VM
Expert Nick Lewis analyzes the techniques employed by watering hole attacks and discusses how to use a secure VM to defend enterprises against them. Tip
-
Why SSL certificate security matters
In this Security School, you'll learn about specific methods used to exploit SSL and how to defend against them. partOfGuideSeries
-
Quiz: Why SSL certificate security matters
In this five-question quiz, evaluate your knowledge of our Security School lesson on why SSL certificate security is important. Quiz
-
Avoiding the invisible: How to defend against iFrame attacks
How can enterprises and users protect themselves from malicious content embedded in iFrames? Expert Nick Lewis explores iFrame attack mitigations. Answer
-
FBI arrests attackers associated with Facebook cybercrime ring
Cybercriminal gang associated with the Butterfly Botnet is believed to have netted more than $850 million by stealing credit card and bank account data. News
-
UK job search website vulnerability allows unchecked job postings
The website flaw was exposed by hackers who registered as employers and posted a fake job advertisement. News
-
Adobe issues critical Flash Player update
Critical flaws can be exploited by attackers to take complete control of a victim's machine, the software giant said in an advisory. News
-
How to secure Java amid growing Java security vulnerabilities
Constant Java security vulnerabilities plague Oracle and enterprises alike. Expert Nick Lewis offers tips on how to use Java and the JRE securely. Tip
-
Choosing a Web security gateway
In this Security School lesson, you'll learn about the different features available in Web security gateways, key product selection considerations and how to ensure the deployment is successful. partOfGuideSeries
Security Management Strategies for the CIO