HTTP response headers aim to help protect web applications from cross-site scripting (XSS), man-in-the-middle (MitM) attacks, clickjacking, cross-site request forgery and other threat vectors.
Recent research has failed to pin down exactly how the current crypto-mining craze is trending, but companies can derive many key enterprise security lessons from the latest headline-grabbing threat.
A group of researchers discovered a flaw in the protocol used in telecommunications networks that could enable fraudsters to pursue at least 10 different types of 4G LTE attacks.
As data breaches gain public attention, vulnerability disclosure becomes an increasingly crucial part of the incident response process.
According to security firm Menlo, many popular websites are more vulnerable to internet security threats such as typosquatting and background attacks than their reputations would suggest.
Organizations are increasingly failing to secure internet-facing industrial control systems (ICS) that manage critical infrastructure, putting them at risk of ICS-specific malware.
Endpoint management and security is a daily battle. You need a solution that helps you discover, manage and secure your endpoints faster, more easily and more consistently.
Organizations around the world should take stock of the security lessons they learned in 2017 to set realistic, achievable goals for the new year.
The move to SAP Business Suite 4 SAP HANA requires a thorough security impact assessment that addresses external threats, governance, risk management and other factors to ensure a secure migration.
Wi-Fi Protected Access (WPA3), the updated version of the globally used wireless security protocol, is set to launch later this year to help boost network defenses.