The Latest in IT Security

Posts Tagged ‘Applications’

If your organization is like most, you’re likely using or considering cloud-hosted #applications and #infrastructure. Security in the cloud is just as important as security in on-premises IT environments, though it’s different in several important ways. There are many great organizations to help you understand #cloud security and to recommend #best practices – Cloud Security […]

Read more ...

Since Monday, security pros can add another XSS-finding tool to their arsenal, as Netflix has open sourced their cross-site scripting payload management framework dubbed “Sleepy Puppy.” Sleepy Puppy is meant to address the biggest problem with identifying omnipresent XSS issues: finding them not only on targeted applications, but also on others that are not available […]

Read more ...

A group of Italian researchers have come up with new obfuscation techniques that can be used to dupe malware detection systems and allow malicious actors to execute successful drive-by download attacks. “The explosive growth of malware is continuously fueled by the release of new technologies for the web,” they researchers noted. “On a side, standardizing […]

Read more ...


Categories

SATURDAY, APRIL 19, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments