You’ve probably come across article headlines about parents facing the headache-inducing consequences of their children placing orders online. We’ve reached the day when it has become so easy to shop online that toddlers can (and do) place successful internet orders.
Continue Reading...
Posted in IoT Security
If you’re registered to vote in the U.S., you probably recall the information collected at registration. To refresh your memory, personal details such as your name, address, date of birth, driver’s license number, and the last four digits of your social security number are all contained within your state’s voter rolls and records. All of this information is also very attractive to malicious hackers.
Continue Reading...
Posted in Data Breach Security, Public Sector Cyber Security
Security is a game of constant catch-up. We are always trying to secure against threats while remaining agile enough to accommodate the unanticipated curve ball. Properly mitigating threats requires strong security considerations during development, deployment, and maintenance of a Web application. In this post, we’ll examine how maintaining focus on key threats to a Web application can help you stay ahead of problems, anticipating them before they occur.
Continue Reading...
Posted in Web Application Security