Monthly Archives: March 2016

Are Developers Being Overwhelmed By An Ever Changing Security Landscape?

Developers Overwhelmed By Security LandscapeIt’ll come as no surprise that many developers feel they are losing the battle against online criminals and data thieves. With ever increasing frequency, we hear of major security breaches at organizations users should be able to trust with their data. As more of the economy moves online, the potential rewards for hackers have increased exponentially. Developers feel beleaguered. In a reversal of the usual commonplace about criminals and those who fight them, hackers have the luxury of making as many mistakes as they need to before they hit on the right strategy. Developers pay dearly for any mistakes they make in the design and construction of secure systems. Read more »

An Overweight CMS Is Bad For Performance And Security

Overweight CMS Bad Fro Performance And SecurityModern content management systems make it almost too easy to install new features. WordPress in particular has a plugin and theme ecosystem that encourages experimentation. Tens of thousands of developers contribute plugins to the WordPress ecosystem, and browsing through the plugin repository presents enticements at every turn. The temptation is to install plugins on a whim — after all, they’re free, so why not? Read more »

Containers Aren’t As Easy To Secure As They Should Be

Containers Not Easy To SecureUnless you’ve been hiding under a rock, you’ll be well aware of the recent critical vulnerability discovered in the GNU C Library, a core component of the vast majority of Linux distributions. The vulnerable function was used in many thousands of Linux applications across potentially millions of devices, including servers. Read more »

This Is Why We Need Something Better Than Checksums To Verify Downloaded Software

We Need Something Better Than ChecksumThe developers behind a popular desktop Linux distribution recently revealed that their site had been hacked. For several hours the link leading to one or more of the distribution’s direct downloads in fact lead to a compromised version of the distro with a backdoor installed. If users downloaded the distribution during that period, they may have installed an operating system that was wide open to an attacker. The attacker responsible, who goes by the name of Peace, claimed that he has control over several hundred machines running Mint. Read more »

get in touch Get in touch with us

Questions? Concerns? Comments? We want to hear from you! Drop us a line with whatever is on your mind and we will get back to you ASAP!!



Signup to be the first to know about new products and services!