Real-time visibility into global cyber attacks

Already popular among security professionals as a live threat visualization, the Norse Live Attack Map has been rebuilt from the ground up to be more visually appealing and entertaining, and to provide deeper insight into the source and nature of cyber attacks. It features a completely redesigned interface that lets users zoom in on geographic Read More …

Hopefully, you've found this post helpful. Please share with others:

A close look at SANS: 2015 State of Application Security Report

I used to work as a software developer while back. But things have changed a lot since then. The industry has experienced so many high-profile application security breaches that resulted in the compromise of personally identifiable information, software developers now days have to become more aware of how important—and how hard—it is to write secure Read More …

Hopefully, you've found this post helpful. Please share with others:

Is Your Company Data Safe on the Cloud?

Cloud computing is a model for enabling ubiquitous network access to a shared pool of configurable computing resources. In the last decade, cloud services have rapidly become one of the most defining technologies in IT and the cloud migration exodus has begun. For many, the benefits of cloud computing outweigh the risks. Cloud computing directly addresses Read More …

Hopefully, you've found this post helpful. Please share with others: