November 18, 2015 App Developers’ Use of Back-end Cloud Services Puts Sensitive Data at Risk 2 min read - App developers love using BaaS providers to store and host the data they collect from users, but researchers said it puts sensitive data in danger.
Data Protection November 18, 2015 Dream Apps or Database Security Nightmare? No Excuses for Lax NoSQL Security 3 min read - Don't let your NoSQL database security — or lack thereof — keep you up at night. Instead, work on securing your dream apps throughout development.
November 12, 2015 TalkTalk Hack Could Have a $53 Million Price Tag, Even if Few Customers Are Affected 2 min read - The latest TalkTalk hack could come with a hefty price tag for the Internet service provider — and major security implications for victims.
November 10, 2015 SAP Vulnerabilities Shaking HANA’s Tree, Could Lead to Data Breach 2 min read - A new set of SAP HANA vulnerabilities could put corporate data at risk of severe, remote attacks and possible data breach if left unpatched.
Advanced Threats November 9, 2015 Cybercriminals Phish Their Way Into Customer Loyalty Programs 3 min read - Loyalty programs can bring big rewards to customers, but they also may make organizations more appealing to cybercriminals looking to steal data.
November 4, 2015 Gold Standard? Security Startup Earns $35 Million From Goldman Sachs 2 min read - Security startup iboss just received $35 million in Series A funding from Goldman Sachs — can their anomaly detection offering help Sachs stay relevant?
Cloud Security November 3, 2015 Cloud Has Torn Down the Firewalls: Can You Protect Your Cloud Data? 3 min read - As clients embrace cloud environments, firewalls come down and new types of users start accessing cloud data, introducing additional security challenges.
Data Protection November 2, 2015 From Compliance to Breaches: Managing Data Source Vulnerabilities Is a Big Challenge 3 min read - IBM Security Guardium Vulnerability Assessment can help solve a twofold problem faced by many enterprises: managing compliance and securing data.
Application Security October 29, 2015 Have Legacy Web Applications Become a Privacy Problem? 2 min read - Many legacy Web applications are still in use, but they need to receive a security overhaul if they are to remain viable in today's world.
Data Protection October 28, 2015 Two Important Lessons from the Ashley Madison Breach 5 min read - The Ashley Madison data breach was one of the most notable of 2015 so far, and there are several security lessons buried in the scandalous headlines.