Dark Reading, January 8, 2020, with comments by Vinay Mamidi No-code and low-code development platforms are part of application development, but there are keys to making sure that they don't leave security behind with traditional coding. The appeal of the no-code and low-code trend in application development is pretty obvious. It offers greater ease of process - developers get to [...]
DataCenter Knowledge, IT Pro Today, Channel Futures, January 10, 2020, with comments from Satya Gupta Microsoft is ending support for the popular OS, sparking key security concerns In just two days on January 14, Microsoft is retiring Windows Server 2008 and other platforms. Even though Windows 2008 has been around for over a decade, it’s still one of the best [...]
Top Tech Trends, December 31, 2019, with comments from Virsec’s (in order) Willy Leichter, Satya Gupta, Ray DeMeo and Shauntinez Jakab ClearanceJobs reached out to numerous technology experts across the country to get their insight into the top IT trends of 2019 – and what might be in store for next year. Excerpts of that article are below. Read full [...]
Virsec nominated for 9 Cybersecurity Excellence Awards! Please see Award categories below. We invite you to review the awards and vote for as many as you wish by January 31. Please feel free to share with your colleagues too! We appreciate your participation. Vote Now: 1.Cybersecurity Professional of the Year: Atiq Raza, CEO, Virsec 2. Most Innovative Cybersecurity Company: Virsec [...]
Dark Reading, December 23, 2019, with comments by Willy Leichter How would the world's most generous elf operate in a world of zero-trust security? A group of cybersecurity experts talk about it. Santa prepares his product lines all year long for worldwide distribution on one night, Christmas Eve. His distribution model hasn’t changed much – personal delivery around the world [...]
Information Security Buzz, November 28, 2019, with comments by Ray DeMeo; Just before Thanksgiving, the Department of Homeland Security (DHS) released its refreshed list of the 25 Most Common Software Weaknesses. The list of Common Weakness Enumeration (CWE) contains the 25 most dangerous software errors, so named because they are considered the most frequent and critical errors that can result [...]
Journal of Cyber Policy, IS Buzz News, December 6, 2019, with comments by Satya Gupta; Hundreds of thousands of customer phone bills from AT&T, Verizon and T-Mobile were found on an exposed storage server Last week TechCrunch released news that a Sprint contractor placed hundreds of thousands of cell phone bills belonging to subscribers on an unprotected Amazon AWS server. [...]
Data Center Knowledge, November 12, 2019, with comments by Satya Gupta Based on the secure chip in Pixel phones, the recently open sourced project holds promise for data center hardware. Google made its new computer chip, OpenTitan, open source last month. The project is a hopeful one for making computing chips more secure and cheaper, in time. It will take [...]
Listen to podcast What does Chinese tech giant Huawei have in common with the precocious kid next door who knows how to hack his favorite video game? The former has been accused of placing hidden backdoors in the firmware of equipment distributed to smaller telecom companies all across the U.S. The latter knows how to carry out a DLL injection hack — [...]
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.