The Latest in IT Security

Posts Tagged ‘information security’

The Java programming language offers a seamless and elegant way to store and retrieve data. However, without proper input validation and safeguards in place, your application can be vulnerable to unsafe deserialization vulnerabilities. In a best-case scenario, deserialization vulnerabilities may simply cause data corruption or application crashes, leading to a denial of service (DoS) condition. […]

Read more ...

Databases hold vast amounts of personal information including some very sensitive tidbits, creating headaches for the companies that must curate them. Now, sophisticated tools and technologies are making it possible for database developers to have their cake and, to stay in metaphor, not count the calories by keeping the information private. The solutions depend upon […]

Read more ...

When preparing a targeted attack against a company, attackers sometimes resort to dumpster-diving, hoping to find useful information. In real life they won’t stumble across 50 valid passwords in a trash can, Hackers style, but cybercriminals can still find a lot of useful intel in company trash. What shouldn’t go in the garbage Even the […]

Read more ...


Categories

WEDNESDAY, SEPTEMBER 22, 2021
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments