application Security

What makes identity-driven security the new age firewall

What makes identity-driven security the new age firewall

Propelled by the need to provide a holistic, identity-driven protection, Microsoft’s Enterprise Mobility & Security solutions (EM&S) stitches in intuitive security on a future-ready platform. What takes the cake though, is that it ensures productivity without compromising on user privilege.

50 hashes per hour

50 hashes per hour

Raspberry Pi - a new type of attack successfully allows an intruder to retrieve user authentication data – even when the targeted system is locked.

Detecting and Responding to a Ransomware Attack

Detecting and Responding to a Ransomware Attack

Ransomware attackers are motivated entirely by money, and they go after your high-value data.Here’s how one common type of Ransomware exploit happens, and what can be done to stop it.

Comprehensive data security in the cloud

Comprehensive data security in the cloud

With increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, devices and networks – all hosting sensitive data.

BSides Denver 2017

BSides Denver 2017

A fine local gathering with talks on advanced social engineering, APT herding, securing smart cities and more, with quality content.

Ztorg: Money for infecting your smartphone

Ztorg: Money for infecting your smartphone

Large Scale network promotes applications infected with the Ztorg Trojan through advertising campaigns. Infected viruses are gaining thousands of new users each day!

Load More