Getting Paid for Breaking Things: The Fundamentals of Bug Bounty

| | Hacking
According to the latest Software Fail Watch report released by Tricentis, companies all over the world lost $1,7 trillion last year over software failures and vulnerabilities. Such tremendous losses... Go on to the site to read the full article ... Read More

Identity Governance and Administration (IGA) in IT Infrastructure of Today

Identity Governance and Administration (IGA) can be considered a very important area in the management of information technology in enterprises and organizations. The level of IGA importance can be... Go on to the site to read the full article ... Read More

And Again, About Storing Passwords

| | General Security
When the question of storing passwords arise, the first idea is to simply keep them in clear text in the corresponding table in the database. However, in 2018 cybercriminals are very good at getting... Go on to the site to read the full article ... Read More

Personally Identifiable Information and Distributed Ledgers

| | General Security
PII (personally identifiable information) is a valuable component of every individual’s life. Governments and organizations take significant efforts to protect this data on the local and... Go on to the site to read the full article ... Read More

Top Threats to Online Voting from a Cybersecurity Perspective

Last year, NASA set up an online voting campaign to pick a name for an astronomical object, a small ice-covered asteroid roving through a remote part of the Solar system. Although the New Horizons... Go on to the site to read the full article ... Read More

What Is an IdM and How to Discover If You Need One

IdM is an abbreviation for “Identity Management,” i.e., management of user accounts. Let’s turn to Wikipedia: “IdM is the security discipline that enables the right... Go on to the site to read the full article ... Read More

10 Tips to Increase IoT Cameras Protection

From various security reports on IoT botnets, we know that most digital video surveillance systems used by small and medium-sized businesses contain vulnerabilities and can be hacked. This article... Go on to the site to read the full article ... Read More

User and Entity Behavioral Analytics (UEBA) Overview

The human factor is one of the key issues of information security. On the one hand, humans are common sources of various threats to information security, and on the other hand, monitoring the... Go on to the site to read the full article ... Read More
Virtual Machines vs. Containers

Virtual Machines vs. Containers

What technology is more secure? Many people think that virtual machines are more secure. In theory, yes, but in practice … there are doubts. We often hear statements such as, “HTTPS is... Go on to the site to read the full article ... Read More

Mobile Applications Security Problems as a Result of Insufficient Attention of Developers

In the second half of 2017, developers uploaded about 2800 applications on Google Play on a daily basis. Each of these applications contains a certain amount of data that is stored or transmitted via... Go on to the site to read the full article ... Read More
Loading...