We are pleased to present you with the recording of the latest webinar that was held on the 22nd of March. The webinar was presented by: Kevin Beaver of Principle Logic (http://www.principlelogic.com/) Maty Siman – Foudner & CTO of Checkmarx (https://www.checkmarx.com)
According to FBI Director Robert Mueller, cyber-crime is on track to surpass terrorism as the most serious security threat in the United States. Businesses in particular face an increasing risk of exposing themselves to cyber-attacks. Here is a list of the top five cyber threats that threaten businesses today.
Application Security- Not Sufficient! A study was recently conducted among 800 It executives which found that there is a huge difference between the perception of Security from the viewpoint of the developer and security professionals. Security professionals view the applications in a far more optimistic light- stating that they are secure enough, whilst developers say
What a busy week it was. Endless critical vulnerabilities were found in major platforms. I decided to focus on three of them 1) (CRITICAL) RDP Remote code execution – you server allows incoming RDP (Terminal Server)? The most probably people can gain admin access without having a valid name and password:
Where is NASA’s security? 5,408 successful eruptions since 2009, 48 stolen laptops and mobile devices,47 advanced persistent threats (APTs) and 13 that managed to jeopardize thousands of NASA’s computers causing serious damage and leaving NASA with an approximated $7 million bill. http://www.space.com/14750-stolen-nasa-laptop.html
Let’s understand the web application security dilemma! Organizations within the financial services industry track an average of 800 attacks, organizations out with the financial services industry track an average of 500 attacks- no wonder it’s so vital to understand application security. It’s said that the security challenge is due to the fact that most of
Mobile banking threats Millions of consumers are currently using mobile banking – which is expected to be the next major target for hackers. As banks are focusing resources in securing mobile applications, two important precautions developers must take into account include:
Hackers in China accused of a long term breach of Nortel For almost ten years Chinese hackers gained complete access to the internal network of Nortel Networks, Ltd. Nortel was previously considered to be a telecommunications power house but has been struggling financially in recent years. The hackers stole several passwords from top Nortel executives