Many SAP Deployments at Risk Due to Insecure Configuration

Security researchers claim that a large majority of SAP systems deployed inside organizations are vulnerable to attacks that could completely compromise their sensitive data because of an insecure default configuration. The issue, which affects a core component of SAP deployments called SAP Netweaver, has been known for more than a decade. However, new versions of..
Read more

RSA App Exposes User Data Due to Common Developer Mistake

Late last week security researchers found the RSA security conference exposing conference attendee data via vulnerabilities in its mobile app. Because a 3rd party developer had hard coded data – including security keys and passwords – in the RSA Conference application, a researcher was able to use an API to download and decrypt data containing
Read more

3 Security Best Practices We Used to Build a Strong Foundation at Threat Stack

As a security company, Threat Stack prioritized the implementation of security best practices from day one. To share our experience, this post focuses on three basic best practices our engineering team implemented when we first started out. They’re quick to set up and can produce measurable improvements right out of the gate — and for … Continue reading "3 Security Best Practices We Used to Build a Strong Foundation at Threat Stack"
Read more

Keeping Your WAF Relevant: Emergency Feed Pushes New Mitigations in Just Hours

We previously reported that the overall number of new web application vulnerabilities in 2017 showed a 212% increase from 2016’s 6,615 to a whopping 14,082. This spike was due, in part, to high-profile vulnerabilities like Heartbleed, Shellshock, POODLE, Apache Struts 2 and more recently, Meltdown and Spectra. There is, however, good news in the form
Read more

Learn to Secure Network Equipment Against Attacks and Malware at May 16 Trusted Computing Group (TCG) Webcast with Cisco Systems, Inc., Huawei and Infineon

PORTLAND, Ore., April 26, 2018 – Trusted Computing Group (TCG) experts Bill Sulzen, Cisco Systems, Inc.; Michael Eckel, Huawei; and Steve Hanna, Infineon; will provide a tutorial on how to secure network equipment against sophisticated threats in a webcast Wednesday, May 16, 1:00 p.m. Eastern Daylight Time/10:00 a.m. Pacific Daylight Time. Much effort has been … Continue reading "Learn to Secure Network Equipment Against Attacks and Malware at May 16 Trusted Computing Group (TCG) Webcast with Cisco Systems, Inc., Huawei and Infineon" The post Learn to Secure Network Equipment Against Attacks and Malware at May 16 Trusted...
Read more

The Internet of Everything and digital privacy: what you need to know

Statistics indicate within the next couple of years, there will be three IoT devices for every adult and child on the planet—IoT will truly be the Internet of Everything. So, should people be concerned about privacy and data security if these gadgets are always on and ready to transmit information? Let’s take a look. Categories: 101 FYI Tags: Data privacyinternet of everythingInternet of ThingsIoTIoT security
Read more

Smart Homes of Tomorrow – Connect all the things!

Intro In 1957 the Monsanto House of the Future was constructed at Disneyland in Anaheim, California. This house was constructed by Monsanto, Massachusetts Institute of Technology and Walt Disney Imagineers to provide visitors with a tour and an idea of what future homes might look like in 1986. Design concepts in the Monsanto House of The post Smart Homes of Tomorrow – Connect all the things! appeared first on Radware Blog.
Read more
Page 1 of 53612345...102030...Last »