WordPress Biggest Security Problem
Considering it is so popular, how come it is labelled as an insecure web platform? WordPress is easy to use. Correct, WordPress? main selling point is also its nemesis, especially when it comes to...
View ArticleImproving IT Security -Merging Defensive and Pro-Active Security Measures
Even though we have a number of solutions that help us take a pro-active approach towards IT security and ensure the security of our infrastructures, we still heavily rely on defensive security...
View ArticleJustifying the Cost of Web Application Security
Web application security software and services are relatively expensive when compared to other type of software and services, hence security professionals need to use more practical examples when...
View ArticleLowering the Guards of IT Security Because of Trust
When a user is trusted he or she is typically allowed to bypass security policies easily, and this should not be the case since the repercussions of such exceptions can lead to much bigger problems in...
View ArticleThe Need for Security Policies that Cater for Everyone's Needs
Security policies are not something that you create once and forget. They should evolve with your organization's need.
View ArticleResponsibly Disclosing Vulnerabilities? Might Not Be The Best Way Forward
Is responsible disclosure of vulnerabilities working? Unfortunately sometimes developers are not responsive so in such case what should happen? Release an advisory and put millions of websites at risk...
View ArticleAddressing the Biggest Security Flaw in the IT Industry
Businesses are constantly increasing their budgets to address IT security problems and ensure their IT assets are secure, yet they are missing one thing; they are forgetting to address the biggest...
View ArticleChoosing the Most Effective Web Application Security Solution
There are many web application security solutions available on the marketing such as automated web vulnerability scanners, web application firewalls and source code analyzers. Though which is the best...
View ArticleImprove the Security Posture of your IT Assets with Automation
Automated software alone is not enough to ensure the security of our networks and web servers, but if used properly they will help us reduce successful hack attacks by more than 90%.
View ArticleAudit Trails, Logs and Their Role in Web Security
Audit trails and logs contain a wealth information that can help you improve the security posture of your website, or fully recover from a hack attack. Read more to see why you shouldn't simply create...
View ArticleYou Cannot Fix a Security Flaw Unless You Know About It
A penetration test can only be as good as the knowledge of the IT security professional doing it. Hence why automated tools should be used.
View ArticleGovernment Surveillance? Privacy? I Don't Care, I Have Got Nothing to Hide
If you do not care about the government surveilling the internet because you have nothing to hide, think twice. As Edward Snowden showed us these systems can be abused and such information can be used...
View ArticleDo You Have Security Policies in Place for Employee's Termination?
We have a lot of security policies in place for our IT assets but very few have some for when an employee's job is terminated. Here are a few guidelines.
View ArticleUse Whitelisting For a More Secure IT World
We already use a whitelist approach in real life and we should apply the same principle to the IT world for a more secure IT world. Never trust users.
View ArticleEvaluating IT Security Tools
The process of evaluating security software does not need to be a daunting experience. Here are some tips which when followed you should be able to find the right security software you need within the...
View Article
More Pages to Explore .....