Skip to main content

Blog

05.Dec.2018
John Stock, Network Security Product Manager
Power BI is a business analytics service that delivers insights to enable fast, informed decisions. Discover how can Microsoft PowerBI add clarity to your vulnerability data
03.Dec.2018
Outpost24 France
The number of cyber attacks has grown up steadily during the last few years. In 2016, 758 million malicious attacks occurred according to KasperskyLab, (an attack launched every 40 seconds) and there is no doubt that 2017 will break the record.
19.Nov.2018
Davey Winder, security journalist
The recent Cathay Pacific airline data breach, the biggest to hit the airline industry to date, should come as a wakeup call to businesses of all sizes and across all sectors.
23.Oct.2018
Sergio Loureiro, Director Cloud solutions
Among the many applications of AI ​​in cybersecurity, the arrival of intelligent assistants (Bots) to improve the speed and accuracy of security data analysis is particularly welcomed. As cloud computing, and now serverless architectures, continue to disrupt IT, the availability of powerful algorithms and machine learning capabilities seem to be a silver bullet for the shortage of security expertise. Nevertheless, data and architecture security of such solutions bring unique challenges. In this article, we will review the potentials and challenges to master security with AI tools.
16.Oct.2018
Davey Winder, Security Journalist
Davey Winder, our guest blogger and an award-winning security journalist, explains the role of Shifting Left for Secure Application Development
09.Oct.2018
Outpost24
Digital transformation is fueling widespread adoption of cloud computing, allowing organizations to leverage virtualized infrastructure and accelerate innovation. The cost advantages that cloud infrastructures offer is clear, but your approach to security may need to change to fit technology and process differences. As you move workloads to the cloud, how can you assess infrastructure, application, and data security risks that might disrupt your business?
02.Oct.2018
Nikos Danopoulos, IT Security Consultant
Local File Inclusion - aka LFI - is one of the most common Web Application vulnerabilities. If conducted successfully, It might allow attackers to read sensitive information, access configuration files or even execute system commands remotely.
18.Sep.2018
Outpost24 France
The PCI Security Standards Council touches the lives of hundreds of millions of people worldwide. A global organization, it maintains, evolves and promotes Payment Card Industry standards for the safety of cardholder data across the globe.
06.Sep.2018
Outpost24
Today, companies are the primary target for hackers because of the sensitive data they hold. Cloud and Big Data technologies are fantastic tools to analyze and manage a large amount of data, but they are often not as secure as they should be. So while companies are benefiting from the availability of such applications to improve their productivity, IT security teams are hit with a wealth of security issues - they've never experienced such lousy visibility for key assets and data, it is hence more important than ever to strengthen the need for web applications testing.
07.Aug.2018
Outpost24
Knowing your weakness is the best defense. Penetration testing involves running simulated hacking exercises against corporate networks, systems, and people to find out if they are vulnerable to an attack. Also called “white hat hacking” and “ethical hacking,” it is the process of allowing security professionals to hack your company like a malicious hacker would do to help uncover security weaknesses.

Looking for anything in particular?

Type your search word here