:-)

Webinar Q&A from Modern Network Threat Detection and Response

As promised, here is my lightly edited Q&A from a recent webinar called “Modern Network Threat Detection and Response.” Questions about vendors are removed, and some are edited for clarity. Q: I ...

Securing Apps When User Devices Are Compromised

Corporate networks and user PCs continue to be exploited—leaving your sensitive applications and data vulnerable. Network segmentation is a fundamental way to mitigate the risks associated with these vulnerabilities—but it only works ...
Access to Applications Based on a « Driving License » Model

Access to Applications Based on a « Driving License » Model

More and more countries are modifying their policies with a new “driving license” model. With a classic license model, drivers can be caught frequently; they just have to pay a huge amount ...
:-(

2012 Redux: What Is Application Security Monitoring?

Now, when you hear a phrase “application security monitoring”, what picture comes to mind? For me, nothing does… As I said in February 2012, “the industry has not yet figured out what ...
Application Exceeds its Brief

Privacy: When the Application Exceeds its Brief

The recent imbroglio surrounding Facebook and its Android application exceeding its brief caught the attention of all users. In other words, the application was requesting access to information on your device that ...
Security Boulevard

OWASP Top 10 Most Critical Web Application Security Risks of 2017

As organizations’ IT environments become increasingly more complex, so too does the software they install on their systems. Software developers and managers have embraced microservices written in node.js and Spring Boot, for ...
Using SLA Management to Save Time and Improve

Using SLA Management to Save Time and Improve

Today more than ever, the success or failure of our digital enterprise rests on whether our customer has a good user experience. No one wants to use something that is difficult to ...
A Cybersecurity Proof: The Application is the Endpoint

A Cybersecurity Proof: The Application is the Endpoint

Vulnerable applications and browsers are the persistent data breach entry points—it’s not about the files Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes It’s time to ...