Asia's Source for Enterprise Network Knowledge

Sunday, May 26th, 2019

Software security

Move up the cybersecurity value chain: busting the myths holding back CSPs from offering DDoS mitigation-as-a-service

This whitepaper examines what is holding back organizations from moving their distributed denial of service (DDoS) defenses to the cloud, and discusses the benefits and cost savings of outsourcing DDoS protection to a specialised managed security service provider (MSSP).
By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Mozilla to harden Firefox defenses with site isolation, a la Chrome

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

With 'Project Fission,' the developer hopes to wall off malicious sites and attack code so websites don't bring down the whole browser.

 

Slack beefs up security with enterprise key management

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

The popular collaboration platform is piloting the new security and compliance feature for enterprise users, with UK challenger bank Monzo a vocal exponent of the platform

 

Reevaluate "low-risk" PHP unserialization vulnerabilities, researcher says

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Over nearly a decade, PHP unserialization vulnerabilities have become a popular route for cyber-criminals to plant remote code execution or deliver other malware into systems. But new research, introduced at Black Hat this month, shows that malevolent hackers can introduce this vulnerability, even in environments that were previously considered low-risk for this attack.

 

Apps Under Siege: Why are applications under attack?

AS we give more control to apps, they are quickly becoming a target for cybercriminals looking for data and more to steal. 

Protect your AWS API gateway with F5 BIG­IP WAF

This article will help you deploy an F5 BIG-IP WAF in front of your AWS API Gateway to provide additional security. It shows how to deploy a basic WAF policy to protect your API Gateway, and you can expand from there to add Denial of Service or bot, OAuth/JWT authorization, geolocation blocking, and more security services.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Oracle plans to dump risky Java serialization

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

A “horrible mistake” from 1997, the Java object serialization capability for encoding objects has serious security issues

 

Schneider Electric patches vulnerable applications

First iOS trojan exploiting Apple DRM design flaws infects any iOS device

Cyber criminals exploiting the vulnerabilities could gain complete control of the underlying system

 

The how to approach for cost effective security assessment

Security Assessment: Your first and last line of defense

Whether you are a large enterprise or a small startup, you are an equal target in the eyes of hacker.

Scaling inline threat prevention tools to keep pace with high-speed networks

This paper outlines how the GigaSECURE® Security Delivery Platform inline bypass functionality helps facilitate the rollout of security initiatives by enabling inline threat prevention tools to scale and keep pace with high-speed networks. With the GigaSECURE Security Delivery Platform, businesses can cost-effectively improve their security posture without sacrificing network performance.
By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.