DDoS Protection Blog

Mobile Device Security Expert Q&A Part II: Start treating phones as computers

This is the second of a two-part Q&A on mobile device security with Kevin Johnson, a security consultant and founder of Secure Ideas. The first part dealt with mobile device security policy. As a SANS instructor, he teaches courses in Mobile Device Security, as well as penetration testing. Kevin is on the Advisory Council of the first...

Read more

Mobile Device Security Expert Q&A Part I: Where BYOD (bring your own device) policy goes wrong

This is the first of a two-part Q&A on mobile device security with Kevin Johnson, a security consultant and founder of Secure Ideas. As a SANS instructor, he teaches courses in Mobile Device Security, as well as penetration testing. Kevin is on the Advisory Council of the first Mobile Device Security Summit, to be held March 12-13 in...

Read more

Up against the wall? Automated firewall change management work flow introduced by Tufin

Firewall audit tools are maturing in their ability to meet the requirements of large, complex, enterprise environments. Tufin Technologies’ latest release of its Tufin Security Suite (TSS) addresses automation to scale and streamline the firewall provisioning process and network visualization and risk assessment to get a handle on both local...

Read more

Exploiting the exploitable: New software vulnerabilities down, but risk remains high, Secunia reports

“If the Rebels have obtained a complete technical reading of this station, it is possible, however unlikely, they might find a weakness and exploit it.” The geek in me couldn’t resist the Star Wars quote to kick off a post on software vulnerabilities and exploits. If the Empire had designed the Death Star the way most software...

Read more

A peek into the underground economy and the market for stolen credit cards

There’s a great article from Bloomberg (Stolen credit cards for $3.50 online) in which author Michael Riley explores the depths of the underground market for stolen credit card data. Reading this is enough to make you want to stuff all your money in a mattress for safe keeping. By some estimates, the underground digital economy has now...

Read more

More Posts