hackers

Penetration vs Vulnerabilty Testing: Do You Know the Difference?

Every time you turn around, it seems there is another high profile data breach in the news that involves the compromise of cardholder data. The Target data breach alone may have compromised the data of more than half of all adult Americans. It has never been more important t...

lock-img

Understanding SSL Validation

Without SSL and SSL Certificates e-Commerce as we know it would not be possible. All SSL Certificates provide a secure connection between a browser and a server with all messages encrypted with Public Key Encryption (PKI) technology. So, why are there so many product offers...

data thief - small

How to Handle a Data Breach

There is a right way and a wrong way for an organization to handle a data breach. Unfortunately, they are sometimes the SAME way. The consensus in crisis management is that it is always best to get in front of a bad news story by getting it out quickly so you can frame the s...

sql vulnerability

vBulletin Announces Emergency Patch for SQL Injection Vulnerability

vBulletin Solutions announced this week that they have a critical emergency patch to their vBulletin forum software to fix an SQL injection vulnerability that could allow hackers to access the software’s databases. The vulnerability and fixes apply only vBulletin version 5....

heartbleed - Copy

Many Servers Vulnerable to Heartbleed. Act Now!

Various news reports have confirmed that many web servers are still vulnerable to the Heartbleed bug, which effects Apache servers running SSL. The bug was first reported early in April of this year. Oracle recently released a list of products affected by the Heartbleed Open...

lock and gloab - Copy

WordPress Joins the Club, Secures Domains with SSL

WordPess announced recently that they would join the club of web applications that use SSL by default for all of the web site’s they host, providing users with secured, encrypted communications. The WordpPress web application was originally designed for the creating blogging...

black wallet

Dark Wallet, What’s all the Fuss About?

In the last few weeks, I have read a fair amount of press coverage about a new Bitcoin wallet application called Dark Wallet. I have also received many inquiries from various sources (customers, blog subscribers, etc.) asking for recommendations on how to stay protected agai...

credit-cards

How to Be PCI Compliant

Overview The Payment Card Industry Data Security Standard (PCI DSS) was jointly developed by American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa Inc. The PCI DSS is now actively maintained by the PCI Security Standards Council, and...

boing springs savings - Copy

Case Study: Boiler Spring Savings Protects Customers with Comodo Technology

Boiling Springs Savings Bank: Financial Institution introduces SVT technology that authenticates web content to protect critical customer information in online banking transactions. Background: Boiling Springs Savings Bank, named after the famed Boiling Springs in the Ruther...

lock and gloab - Copy

Trusted Root Keys: Why they Matter

The growing use of the Internet for commerce, communication and collaboration has significantly increased the need for online security. Certification Authorities, who provide network, Internet and application security solutions for communicating and conducting business, are...

Page 1 of 812345...Last »