Don’t Skip These Security Best Practices

Security has become a critical need among businesses in all verticals. Your customers are no exception.

September Patch Tuesday Includes Servicing Stack Updates for all Windows Operating Systems

With ransomware back in the news, it’s a good time to review cyberattack and disaster recovery plans.
PCI DSS access control

PCI DSS (Data Security Standard) Guidance for Access Control

PCI SSC recommends restricting access to cardholder data based on need to know, giving each user a unique ID, and having physical security in place.
payment and security trends

Not the Monster Under the Bed: PCI Standards Should Help You Sleep at Night

View PCI compliance as best security practices that keep data safe and protect your business — not something to fear.
security

Can’t Miss Updates from August Patch Tuesday

Microsoft was light on updates compared to last month, but Adobe issued several critical updates in August.

Cyberattack Hits Louisiana School Districts, Governor Declares State of Emergency

The number of public sector cyberattacks is increasing. Take these steps to protect your clients.

Need a Secure Operating System? Take a Look at OpenBSD

The Unix-like OS offers support for a wide range of hardware platforms, third-party tools and an active, supportive community.
application security

Q3 2019 Security Update: How Much Can a Data Breach Cost?

Newly discovered vulnerabilities put businesses of all sizes at risk — and the penalties for data breaches reach new levels.
security

How to Evolve DevOps to DevSecOps

Building understanding and cooperation between your development and security teams and automating testing can help you address security earlier in the development process and create secure code.

Everything You Need to Know About Microsoft’s June Patch Tuesday

Microsoft has issued patches that will eliminate 88 vulnerabilities attackers could now work to exploit.

The Hard Truth About ISVs and Cybersecurity

You’re a cyberattack target, and you may not be doing all you can to protect your clients and your ISV business.
security

Advice for Complying with the OWASP Top Ten

According to Veracode, OWASP compliance has declined for the third year in a row. Learn how your business can turn that around and minimize the vulnerabilities in your software.
application security

Bringing Web App Security Up to Speed in the Era of DevOps

Is the race to meet market demands making your customers and your business vulnerable? Take a new, agile approach to security.

Q2 2019 Security Update: It May Be Time to Revise Cybersecurity Best Practices

Malicious URL identification, cryptojacking blocking, and blacklisting processes may need a refresh based on new attack strategies.
securing the Internet of Things (IoT)

Keys to Securing the Internet of Things

IoT security depends on an end user’s policies and practices as well as the security framework the manufacturer includes in the device’s design.

MOST POPULAR