Heat Index
Application Security
Most Recent
Read More
March 11, 2017

Zero-day Conundrum: Keep or Disclose Vulnerability Stockpiles?

Business Should Move to an Incident Response Security Posture and Accept that Governments Will Maintain Stockpiles of Zero-days

With surprising concurrency, the RAND Corporation has published a lengthy study into zero-day exploits stockpiled by government just two days after WikiLeaks released its batch of documents on CIA hacking tools. While many have been surprised and even appalled that the government should maintain a stockpile of zero-day vulnerabilities and exploits, RAND seems to accept it as a matter of fact that all governments do so.

For the purpose of its research, “RAND obtained rare access to a dataset of information about zero-day software [...]

Read More
July 28, 2016

Cyber threats targeting various sectors in the Nordic countries

Security experts at FireEye have published a report that details the cyber threats targeting various sectors in the Nordic countries.

According to FireEye, threat actors targeted strategic industries (i.e. aerospace and defense, energy, health and pharmaceuticals, and shipping), government and defense agencies searching for political, economic and military intelligence.

Experts believe sophisticated threat groups could be particularly interested in sectors such as aerospace and defense, energy, health and pharmaceuticals, and shipping.

Threat actors targeted Nordic countries due to their robust economies and valuable information managed by companies operating in sectors [...]

Read More
September 14, 2015

Does quantum cryptology offer hack-proof security?

New quantum cryptology research could result in systems that are impossible to hack. But good luck trying to explain it to your boss.

Untangling hyper-entangled twisted light.

Photons in the form of a bi-photon frequency comb.

Quantum-powered random numbers generated by an entropy engine that exploits quantum mechanics.

Quantum cryptology may be the hottest topic in security these days, but it sure reads like a lot of sci-fi jargon. But what does it mean?

Bruce Potter, CTO of the KEYW Corporation, defined it to a room full of privacy professionals this past July at the Black Hat conference. He explained that with so much concern regarding the [...]

Read More
July 28, 2015

Top 5 Application Security Trends 2015

From the Heartbleed bug that plagued our social networks, to the recent attacks on Amazon and Sony Pictures, 2014 was truly the year of the cybercriminal.

As the publicity surrounding cybercrime has increased, enterprise IT was forced to up its game. With a renewed focus on security, organisations have rewritten their policies, enhanced their encryptions and upped their anti-virus investments.

Yet despite these efforts, there remains one area of enterprise IT that is frequently left unchecked and underappreciated: businesses’ application portfolios.

With more platforms, updates and apps, the odds of an application security breach have increased year on year. Now, [...]

Watch Videos
Jens Erik Ebbesen: Innovation in Outsourcing
Innovation in outsourcing
Nearshore IT Services
Multi Sourcing: Supplier Integration
Hans Frolich
Adam Harhoff
Sustainable Multi Sourcing
Join Nordic IT

Nordic IT Sourcing EVENTS
Read More
3743Nordic CMO Summit
Read More
50232Nordic Cloud and Mobile Security Forum
Read More
16941IP EXPO Nordics

error: Content is protected !!

By continuing to use the site, you agree to the use of cookies. More Information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.