exploits and vulnerabilities - News, Features, and Slideshows

News about exploits and vulnerabilities
Features about exploits and vulnerabilities
  • Penetration Testing

    This is a real issue, and not just one for the well publicised attacks on major corporations such as Sony, Lockheed, Google, and Citi. It affects every business and organisation, large and small. More worrying still, it is now widely suggested that hackers and espionage organisations are moving away from directly attacking their target company, choosing instead to route their attack through suppliers to their target. Thus, even small and seemingly innocuous “third party” businesses who would not consider themselves as potential targets are now on the front line of this cyber war.

    Malcolm Higgins | 13 Jul | Read more

  • Why traditional security doesn't work for SOA

    Many organizations are embracing SOA as a way to increase application flexibility, make integration more manageable, lower development costs, and better align technology systems to business processes. The appeal of SOA is that it divides an organization's IT infrastructure into services, each of which implements a business process consumable by users and services.

    Chris Clark | 19 Jan | Read more

Whitepapers about exploits and vulnerabilities

  • Authentication Solutions Buyer's Guide

    Authentication is the most visible security control for applications used by enterprises and their customers. Individuals who would like more details regarding strong authentication methods available today to secure access to corporate networks and enterprise or customer applications. Learn how your environment will dictate which method is right for you.