Tag: Security

Developing and overcoming the challenges with distributed application using microservices
With the evolution in technology, the development of single application has also changed by dividing application to multiple applications. These multiple applications can be located at various geographical location & developed using different technologies. To communicate between these multiple (interconnected) applications is...

SeCaaS – A Step Towards a Secure Cloud
Cloud provides its customers with many characteristics such as on-demand scalability, payment as per usage of the resources, accessibility to the data and application from anywhere in the world. With all these features provided by the cloud, security remains the major issue...

Blockchain Transaction Authentication and Security
In the blockchain world, data distribution to all trust less entities and immutability are the major advantages in terms of building transparency in transactions. Then what about the transactions happening between entities who want to maintain secrecy or need authentication so that...

Securing Supply Chain with Blockchain
Supply chain management was a big idea to improve visibility and control on goods as they moved from point A to point B a few centuries ago. However, with current technologies and concepts, it has become difficult to manage such a big...

E-ZPass Spear Phishing Email Alert
Please be aware of a Spear Phishing email that targets E-ZPass users. The subject line reads “FW: Pay for driving on toll road” and the body of the email looks like this: You have not paid for driving on a toll road....

Cyber Security Summit Wrap Up and Tips to Detect, Defend, Recover
Have you ever been to an event that left you wanting more when the subject matter just wasn’t up to par or even worse, an event that was almost entirely sales focused and you found yourself spending more time fixing yourself another...

Is Employee Cybershopping Threatening Your Company’s Security?
As we wrap up one of the biggest cybershopping weeks of the year many CEO’s and CIO’s are probably wondering how much time their employees spent shopping online this week and may be overlooking the security implications of this activity. Industry statistics...

Has it really come down to a bag of chips?
A recent vending machine company had some of its POS systems compromised at waterparks in Wisconsin and Tennessee. This was a major breach…up to 40,000! Go figure. People can’t even buy some snacks or what not from a vending machine without having...

Security Faux Pas
Organizations and the press do a pretty good job of keeping the average person aware of the latest big technology vulnerability or exploit. And yet, we still see some common mistakes people make that could make them a susceptible to being exploited....

Too Extreme? I don’t think so. Tying security to compensation.
A colleague of mine recently posted a blog about the Black Hats getting the job done and rightfully so. Hackers have been pillaging the countryside lately. How many company compromises have there been over the last 3 months? More than there should...