Open Source Server Side e-mail Scanner

Clam AntiVirus is an anti-virus toolkit, designed especially for e-mail scanning on mail gateways. It provides a multi-threaded daemon, a command line scanner, and an advanced tool for automatic database updating via Internet. The ClamAV engine can be reliably used to detect several kinds of files. In particular, some phishing emails can be detected using [...]

By |Uncategorized|Comments Off on Open Source Server Side e-mail Scanner

How SAML Flaw bypasses password using Single-Sign-On

A newly discovered vulnerability lets attackers take advantage of single sign-on (SSO) systems relying on Security Assertion Markup Language (SAML) and authenticate as another user without knowing his or her password. Step one of SSO authentication is via the Identity Provider (IdP), which checks usernames and passwords, verifies account status, and prompts two-factor authentication. The [...]

By |Uncategorized|Comments Off on How SAML Flaw bypasses password using Single-Sign-On

Importance of Vulnerability Management

The number of attacks like the recent one against Equifax have risen dramatically in the last few years, resulting in the exposure of hundreds of millions of private records. Almost without exception there has been some fundamental flaw related to configuration or patching of systems. This trend will continue without systems designed to automatically identify, [...]

By |Uncategorized|Comments Off on Importance of Vulnerability Management

Planning for Disaster Recovery

Given the constant and connected nature of software driven businesses, customers and users have grown to be less forgiving and more fickle with their attention. An outage in a single service can impact all of its users. An outage in a multi-tenant platform has an exponential impact as it impacts the users of all the [...]

By |Uncategorized|Comments Off on Planning for Disaster Recovery

CPU Exploits: Understanding Meltdown & Spectre

Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware bugs allow programs to steal data which is currently processed on the computer. Security researchers working for Google’s Project Zero group, along with other research groups and academic institutions, have discovered a series of far-ranging security risks involving speculative execution. Speculative execution is one [...]

By |Uncategorized|Comments Off on CPU Exploits: Understanding Meltdown & Spectre

Serverless computing

How does renting computing horsepower sound. Rather than taking the complications of designing and managing cloud architecture, some CIOs are going “serverless.” With serverless computing, cloud instances are no longer allocated, only to sit idle until called upon to fuel applications and other functions. Rather, resources are provisioned only when a specific event occurs. When [...]

By |Uncategorized|Comments Off on Serverless computing

Lack of C-level Oversight in Security

Despite all the attention that massive hacks and other breaches have attracted in recent years, organizations everywhere still struggle to comprehend the scale of and manage emerging cyber-risks. Of the more than 9,500 senior executives in 122 countries who participated in PricewaterhouseCoopers' Global State of Information Security Survey (GSISS) 2018, only 39% say they are [...]

By |Uncategorized|Comments Off on Lack of C-level Oversight in Security

The Real Repercussions for Cybersecurity Lapses

The past year has shown how real the implications of attack breaches are for business viability, for the job prospects of top brass in charge when lapses occur, and even for the personal finances of CEOs when the fecal matter hits the fan. Uber's massive data breach of 57 million accounts and its $100,000 effort [...]

By |Uncategorized|Comments Off on The Real Repercussions for Cybersecurity Lapses

Cloud Private turn your data center into a cloud

IBM says it has just such an offering in IBM Cloud Private, a platform focused on assisting private data centers looking for a relatively simple way to move into the cloud. The idea is to offer a consistent way of managing your application stack, regardless of where they reside. IBM Cloud Private takes middleware and [...]

By |Uncategorized|Comments Off on Cloud Private turn your data center into a cloud

EndPoint Security – Rewriting the rules of patch management

In a world where seconds matter, the right endpoint solution can be the difference between a successful patch management strategy and one that leaves your organization at risk. Hackers are racing to exploit vulnerable computer systems before software vendors publish patches and you can apply them. When hackers win the race, you lose productivity and [...]

By |Cybersecurity, General, Uncategorized|Comments Off on EndPoint Security – Rewriting the rules of patch management
Go to Top