Information Security Blog
Why a Business Impact Analysis Must Cover the Entire Business
As the first step in business continuity planning, a business impact analysis (BIA) requires a strategic understanding of the business as a whole to drive the conscious, informed prioritization of functions across the entire organization. But as you know if you’ve...
read more5 Bonus Benefits of a Network Vulnerability Assessment
Even if your company has a robust firewall, an intrusion detection system (IDS) and antivirus/anti-malware, hackers can still gain access to your systems and data by exploiting vulnerabilities in your networks. Finding those vulnerabilities before the attackers do...
read moreThe New Face of DDoS Attacks: Bigger, Badder, & Available “as-a-Service”
In a distributed denial of service (DDoS) attack, the attacker seeks to make it impossible to deliver the targeted online service. The attack does this by blocking legitimate access to one or more components of the service: servers, networks, applications, devices or...
read moreFile Inclusion Vulnerabilities and Defenses Against Them
File inclusion vulnerabilities, including Remote File Inclusion (RFI) and Local File Inclusion (LFI) are most commonly found in web applications running PHP scripts, but also frequently occur in JSP, ASP and other code. They allow an attacker to submit input to the...
read moreNew OWASP Top 10 Includes 3 New Web App Vulnerabilities
The “OWASP Top 10” list of the most critical web application security risks is widely used as a basis for application security testing and as high-level guidance for assessing risks and prioritizing remediation of vulnerabilities. Recently, for the first time since...
read more