Security

How Secure is Google's New Wi-Fi Router?

Google is a company that definitely needs no introduction. Starting off with a search engine embedded with artificial intelligence now this tech giant has taken the market with great ease. In the wake of advancement in internet connectivity devices and components, Google is all set to stun the market with its hardware capabilities. OnHub is the latest addition to the Google hardware family which has been launched in partnership with TP link.

What is Internet of Things (IoT) and its Impact on Industries?

A British entrepreneur, Kevin Ashton coined this term “Internet of Things” in 1999. Also called “Internet of Everything”, it is the way of interaction amongst network of physical objects or things included within software, sensors, electronics, and connectivity. It enables objects to transfer data inside a network, to connect with humans, with computers or with other objects.

Web Application Security Testing: SAST, DAST or IAST?

Since early 2011 Gartner has been writing about how to combine Static application security testing (SAST) and Dynamic application security testing (DAST) approaches to application security testing and raising many questions about the subject. This post will explain the differences between the two methodologies, the advantages disadvantages of the two approaches and how they can work together from a business perspective and from the perspective of web applications, as these are the weakest in term of security.

Static Application Security Testing (SAST) 

CMS Security 2015: Top 5 Security Tools for WordPress, Drupal, and Joomla

WordPress, Drupal, and Joomla power three-fourths of the world’s CMS-based websites. A few simple steps will keep your CMS-powered website secure:

  • Keep your CMS software up-to-date. Immediately install all updates to core software and plug-ins. If you don’t visit your admin panel daily, schedule a reminder in your smartphone for updating your CMS regularly.

  • Perform regular backups. Backup your site and its database at least weekly, perhaps at the same time you check it for updates.

Smart Wearables and Cloud Security: The Rise of Mobile Malware

When you look at the greatest technological advances of the past several decades, it's clear that software has taken the lead. While hardware continues to improve, get smaller and do more with less, it's software that has enabled feature-rich operating systems that can exist on an interface barely larger than your hand. Hardware has maintained a more or less consistent form. It's no wonder then that many corporations are still painfully in the dark ages when it comes to the increase in the BYOD ecosystem. As the new Apple Watch and other smart watches begin to hit the scene, it's going to become increasingly difficult for network engineers to keep company networks secure.

Uncle Sam Wants You To Update Your WordPress Plugins

In times of war, you may be asked what you can do for your country. In modern times, your country may be asking you to do your part by updating your WordPress plugins.

The United States' Federal Bureau of Investigation (FBI), through the Internet Crime Complaint Center (IC3), issued a public service announcement last week recommending website administrators to update their Wordpress sites. More specifically, the bureau wants you to update your third-party WordPress plugins.

Five Key IT Security Trends For 2015

Ian Kilpatrick, chairman Wick Hill Group, specialists in secure IP infrastructure solutions, looks at five key IT security trends and solutions for 2015:

1. Rise in security breaches

The current high level of security breaches, from the largest organization down to the smallest, will continue unabated. What will also grow in 2015 will be the acceptance that security breaches are pretty well unavoidable for the majority of organizations. Companies will need to change their approach to security in order to reflect this. Security spending will continue to increase, with spending growth higher on asset security over perimeter security.