by Dutta | Sep 30, 2018 | Antivirus, Cyber security, Data Security, Home Network Security, Internet, Internet of Things, Internet Security, Mobile Security, Security, Web Security
It had to happen again, because it always does with alarming regularity. But the exposure of 380,000 BA customer payment cards is one of the biggest single UK payment card security gaffes ever. BA said the stolen data did not include travel or passport information. It...
by Dutta | Sep 27, 2018 | Corporate Software Inspector, Cyber security, FlexNet Code, Patch Management, Security, Vulnerability Assessment, Vulnerability Management, Web Security
Organizations considering a system like the Flexera Data Platform have one overarching question: “Is it worth it?” That’s a very valid question, so let’s take a look at a recent study performed by Forrester Consulting. Flexera commissioned Forrester Consulting to...
by Dutta | Sep 25, 2018 | Cyber security, Data Security, Internet Security, Vulnerability Assessment, Vulnerability Management, Web Application Security, Web Vulnerability Scanner
Any fellow webmaster you may ask who is beyond the novice stage will agree that one of his top priorities will always be keeping his websites secure. However, the number of exploits and tools available to hackers are so vast, and software technologies evolving so...
by Dutta | Sep 23, 2018 | Alerting, Cyber security, Data Security, Encryption, Mapping, Network Configuration Management, Network Monitoring, Network Traffic Analysis, Performance Monitoring, Reporting, Security, Traffic Analysis, Wireless Monitoring
Nearly a million servers around the world still run the unsecure legacy FTP protocol and are actually configured for ‘anonymous’ access. Not good. The file transfer protocol (FTP) utilized by your end users could be the biggest threat to your company’s proprietary...
by Dutta | Sep 20, 2018 | Access Control, Application Control, Content Aware Protection, Cyber security, Data Leakage Prevention - DLP, Data Loss Prevention, Data Security, Device Control, Discovery, Easy Lock, Encryption, Endpoint Security, Internet, Internet Security, Mobile Device Management, Mobile Security, Security
In an age when data can no longer be left unsorted on company networks and data transparency and the protection of sensitive data have become key to reaching compliance with legislations such as the EU’s General Data Protection Regulation (GDPR) and HIPAA,...