Search Results for: database security Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your... Blog Post Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack... Blog Post Enterprise Data Storage Environments Riddled With Vulnerabilities November 12, 2021 In The State of Storage Security Report, researchers from Continuity exposed the dangerous predicament organizations with enterprise storage systems find... Blog Post CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project.... Blog Post Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you... Blog Post How to Implement Secure SDLC to Enhance Your Product Development in 5 Stages March 15, 2021 Any business, organization, or team working in the software development field has heard of the software development lifecycle (SDLC). This... Blog Post Army is advancing facial recognition technology September 2, 2019 “The Army employs biometrics systems in operations to support force protection, physical access needs, other operations but largely it’s been... Blog Post Facial Recognition Technology Causes Fear to 79% of Chinese Citizens December 25, 2019 In a survey of 6,100 Chinese citizens reported this month, 79% of the citizens had responded that they were worried... Blog Post Boost MongoDB Security and Keep Hackers Away With These 10 Powerful Tips May 28, 2020 Multiple businesses across the globe use MongoDB for data storage projects. Though this database has some security configurations by default,... Blog Post Cornerstone Payment Systems Leaked 6.7M Records February 3, 2020 Recently, Cornerstone payment processing company was found failing to protect its database containing credit card transactions. The Cornerstone Payment System... Blog Post NextMotion Plastic surgery firm adds on to the Victim List of Cyber attack in Healthcare February 25, 2020 A recently encountered breach in database belonging to plastic surgery technology company NextMotion adds on to the Healthcare industry cyber... Knowledge Center Windows Memory Forensics Technical Guide Part 2 June 8, 2020 Introduction to Structured Analysis with Volatility. Investigative Process Steps. Windows Processes. Structured Analysis and Investigative Process After a short introduction... Blog Post Injection Attacks Explained April 24, 2020 Injections are amongst the oldest and most dangerous attacks aimed at web applications and can lead to data theft, data... Blog Post Network Intrusion – Detection and Prevention May 13, 2020 Network intrusion refers to any unauthorized activity on a digital network. Network intrusions often involve stealing valuable network resources and... Blog Post Microsoft Customer Support Database Experienced a Breach January 26, 2020 While most people are celebrating the start of the new year, Microsoft’s security team is working overtime to solve a...
Blog Post 46% of Databases Globally are Not Secure – and You Could be One of Them October 12, 2021 If there is one piece of advice that all cybersecurity experts agree on, it is this: patch and update your...
Blog Post Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack...
Blog Post Enterprise Data Storage Environments Riddled With Vulnerabilities November 12, 2021 In The State of Storage Security Report, researchers from Continuity exposed the dangerous predicament organizations with enterprise storage systems find...
Blog Post CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project....
Blog Post Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you...
Blog Post How to Implement Secure SDLC to Enhance Your Product Development in 5 Stages March 15, 2021 Any business, organization, or team working in the software development field has heard of the software development lifecycle (SDLC). This...
Blog Post Army is advancing facial recognition technology September 2, 2019 “The Army employs biometrics systems in operations to support force protection, physical access needs, other operations but largely it’s been...
Blog Post Facial Recognition Technology Causes Fear to 79% of Chinese Citizens December 25, 2019 In a survey of 6,100 Chinese citizens reported this month, 79% of the citizens had responded that they were worried...
Blog Post Boost MongoDB Security and Keep Hackers Away With These 10 Powerful Tips May 28, 2020 Multiple businesses across the globe use MongoDB for data storage projects. Though this database has some security configurations by default,...
Blog Post Cornerstone Payment Systems Leaked 6.7M Records February 3, 2020 Recently, Cornerstone payment processing company was found failing to protect its database containing credit card transactions. The Cornerstone Payment System...
Blog Post NextMotion Plastic surgery firm adds on to the Victim List of Cyber attack in Healthcare February 25, 2020 A recently encountered breach in database belonging to plastic surgery technology company NextMotion adds on to the Healthcare industry cyber...
Knowledge Center Windows Memory Forensics Technical Guide Part 2 June 8, 2020 Introduction to Structured Analysis with Volatility. Investigative Process Steps. Windows Processes. Structured Analysis and Investigative Process After a short introduction...
Blog Post Injection Attacks Explained April 24, 2020 Injections are amongst the oldest and most dangerous attacks aimed at web applications and can lead to data theft, data...
Blog Post Network Intrusion – Detection and Prevention May 13, 2020 Network intrusion refers to any unauthorized activity on a digital network. Network intrusions often involve stealing valuable network resources and...
Blog Post Microsoft Customer Support Database Experienced a Breach January 26, 2020 While most people are celebrating the start of the new year, Microsoft’s security team is working overtime to solve a...