Wednesday, February 22, 2017
Home Tags Access Control

Tag: Access Control

Features of secure OS realization

There are generally accepted principles that developers of all secure operating systems strive to apply, but there can be completely different approaches to implementing...

The problem with passwords: UK workers waste more than two days...

17% spend more than five minutes logging in to work apps each day A quarter must log in to five different apps and systems Nearly one...

Hadoop, CouchDB Next Targets in Wave of Database Attacks

Insecure Hadoop and CouchDB installations are the latest targets of cybercriminals who are hijacking and deleting data. Last week, security researchers said 28,000 MongoDB...

Pwn2Own 2017 Expands Attack Surface Beyond the Web Browser

10th anniversary edition of Pwn2Own hacking contest offers over $1M in prize money to security researchers across a long list of targets including Virtual...

How to secure MongoDB – because it isn’t by default and...

Stop right now and make sure you've configured it correctly The rise in ransomware attacks on MongoDB installations prompted the database maker last week to...

Vera to Help Protect Office 365 Files Across Various Platforms

Working with an installation base that numbers more than 85 million, 3-year-old Vera may soon be a little-known company no longer. Relatively unknown security software...

Cryptzone AppGate 3.0 Release Improves Software Defined Perimeter Security

AppGate 3.0 release adds new capabilities to help organizations provide secure, authenticated access to resources, including Single-Packet Authorization technology that keeps network resources hidden...

MongoDB Ransomware Impacts Over 10,000 Databases

Open, unauthenticated MongoDB database instances are being attacked by multiple groups of attackers, that are encrypting data and demanding a ransom from victims. Attackers are...

Nine Steps for Protecting an IT System Against Ransomware

Unlike the stealthier advanced attacks that can stay undetected on corporate network for months, the impact of ransomware is immediate and intrusive. Ransomware infiltrations in...

SAP Chief Security Officer Details Approach to Infrastructure and Software Security

VIDEO: Justin Somaini, Chief Security Officer at SAP discusses his role and what it takes to secure SAP's infrastructure, employees and software. Justin Somaini became...

Vera for Microsoft protects Office 365 files everywhere

With users always connected and using multiple devices, data can be in several places at the same time.For IT and security administrators tasked with...