Avoiding Mod Security False Positives with White-listing
In this article we will discuss different types of techniques for writing the white-listing rules for Mod Security.
In this article we will discuss different types of techniques for writing the white-listing rules for Mod Security.
We hate to sound gloomy before the holidays, but Christmas not only brings joy and presents. It comes with increasing cyber-crime activity as well, as Hacker Grinch prepares new s…
Researchers at mobile security firm Lookout say they have found malware pre-loaded on mobile devices being sold in Asia and Africa.
Microsoft is planning to close out the year with seven security bulletins next week for Patch Tuesday.
Three of the seven bulletins are rated 'critical' and have to do with vulne…
Investments in cybersecurity and physical security are proportionally connected to your organization’s improved financial picture for a long-term perspective. Our digital lives ar…