Tag Archives: security strategy

Soup Anyone?


June 28, 2013 By
Ryan Berg

I recently attended and gave a brief talk at the Sofware Assurance Working Group. I spoke about the need for security folks to speak with developers – not at them. This is a frequent topic in the security space but I have to question, have we gotten any better? My answer –  “Not so much”. […]

Continue reading...

Categories: Uncategorized

Imperva Experts Reveal The Best Practices And Tactics To Mitigate Insider Threats


October 25, 2012 By
The Vigilant Application Owner

Softpedia – (International) Imperva experts reveal the best practices and tactics to mitigate insider threats. Insider threats have become a major issue, and many information security solutions providers have focused their efforts on precisely determining how such threats can be mitigated. Security firm Imperva contributed to this research with a report that examines the legal, […]

Continue reading...

Categories: Uncategorized

Serious Cybersecurity Lapses Found at Pacific Northwest Electricity Supplier


March 30, 2012 By
The Vigilant Application Owner

March 30, Infosecurity – (National) Serious cybersecurity lapses found at Pacific Northwest electricity supplier. The Department of Energy (DOE) identified serious cybersecurity gaps at the Bonneville Power Administration, which supplies wholesale electric power to regional utilities in the Pacific Northwest, Infosecurity reported March 30. An audit by DOE’s Office of the Inspector General (OIG) found […]

Continue reading...

Categories: Uncategorized

Critical Java Hole Being Exploited on a Large Scale


March 28, 2012 By
The Vigilant Application Owner

March 28, H Security – (International) Critical Java hole being exploited on a large scale. Criminals are increasingly exploiting a critical hole in the Java Runtime Environment to infect computers with malicious code when users visit a specially crafted Web page. According to a security blogger, the reason for this increased activity is that the […]

Continue reading...

Categories: Uncategorized

Cybercriminals Love Affair with Havij Spells SQL Injection Trouble


By
The Vigilant Application Owner

March 28, Dark Reading – (International) Cybercriminals’ love affair with Havij spells SQL injection trouble. Today’s exponential increase in attack volume and complexity can largely be attributed to cybercriminal working smarter with powerful, automated tools. In the database-cracking world, Havij stands as one of the most popular of these tools: and as such, it should […]

Continue reading...

Categories: Uncategorized

Apache Traffic Server Update Closes Important Security Hole


March 26, 2012 By
The Vigilant Application Owner

March 26, H Security – (International) Apache Traffic Server update closes important security hole. Version 3.0.4 of Apache Traffic Server (ATS), the high– 18 – performance caching HTTP/1.1 proxy server, has been released, closing a security hole that could be exploited by an attacker to remotely compromise a vulnerable system. An error when parsing a […]

Continue reading...

Categories: Uncategorized