Securing web applications is not an easy task; especially when the application is constantly changing and business-critical. Identifying where to start could be overwhelming, especially if you’re just dipping your toes in application security. Here are four tips to help you get started. 1. Know your…
Securing MySQL Server on Ubuntu 16.04 LTS – Configuring MySQL Securely, Part 3
In part 2 of this series, we looked at configuring MySQL securely. In this final part we shall continue looking at ways in which to ensure a secure MySQL Configuration. Secure Communications In some cases, we might have the MySQL database server setup on a dedicated…
Securing MySQL Server on Ubuntu 16.04 LTS – Configuring MySQL Securely, Part 2
In part 1 of this series, we looked at Installing MySQL Server on Ubuntu 16.04 LTS. In this second part, we will be looking at configuring MySQL securely. Configuration We will start off with the most common settings by opening the default MySQL configuration file using…
Securing MySQL Server on Ubuntu 16.04 LTS – Installing MySQL, Part 1
Databases can be found in everything from desktop applications, web applications, corporate servers to smartphones and other devices. Almost every software program relies on some sort of database to store its data. As applications continue to grow, so is the amount of data that is…
Recent survey shows cost of a breach has climbed to $158 per record
A recently published report titled the ‘2016 Cost of Data Breach Study: Global Analysis’ has suggested that the average cost of a data breach continues to climb, now reaching an average of $4million per breach, or $158 per record from a survey of 383 companies…
In the headlines: TeamViewer hack, LinkedIn hack, TrainLink breach and more
TeamViewer hack – PCs hijacked and bank accounts drained TeamViewer, the remote desktop connection software that allows users to share screens and allow remote access from anywhere in the world recently went offline allegedly due to a DOS-attack. Users however, claim that their computers were…
Value of cyber security market set to soar to $6.7billion
It comes as no surprise that the value of the application security market has risen dramatically in the last few years. Simple deduction tells us bigger cyber-attacks = more money spent on cyber defense. However, the latest claim by market analysts is that by 2021,…
Scanning non-public web applications with Acunetix Online
The Software Development Life Cycle (SDLC) is full of challenges — developers have strict deadlines for creating functional, scalable, maintainable and testable code. What’s more, that code needs to be secure. Acunetix Online among other features, acts as an IP vulnerability scanner and can automatically…
Verizon Data Breach Investigations Report 2016
So, it’s that time of year again. The Verizon Data Breach Investigations Report is out and its time for us to take a good look and analyze their results. The cover, which is dark featuring an illuminati-style symbol and the pull out statistic of ‘89%…