Blog Archives

Why patching vulnerable Java architecture is not enough

Java’s structural flaws have been openly laid bare on multiple occasions. Ineffective patching is typically the root cause of large-scale Java breaches such as these but what if mending porous code is not enough?

Continue Reading →

Keeping an eye on recent notable Java vulnerabilities

It’s important to always stay on top of new vulnerabilities affecting Java and other open-source programming languages. 

Continue Reading →

Understanding the full scope of modern cybersecurity risks

Many of our most trusted systems are vulnerable to cyberthreats, and there’s no reason to think the average business is immune. 

Continue Reading →

Security issues continue to surround open source development

Considerable vulnerabilities still exist in the arena of open source software. 

Continue Reading →

Major concerns for industrial cybersecurity

Industrial cybersecurity involves unique challenges for IT personnel.

Continue Reading →

New facts emerge regarding CBP data breach

The data breach that caused CBP border checkpoints to reveal photos of individuals crossing the U.S.-Canada border turned out to be more serious than what was initially reported. 

Continue Reading →

June marked by private- and public-sector data breaches

Some high-profile data breaches occurred in the first few weeks of June. 

Continue Reading →

Issues continue to surface with Java Card

Oracle’s Java Card technology is found in countless smart card and SIM applications, but is it going to provide real security for your business?

Continue Reading →

The complex, ongoing conundrum of Java

Determining whether or not to use Java can be difficult for some organizations, given the continued debates over its risk or lack thereof. 

Continue Reading →

Exploring government oversight into open-source coding and app development

Government regulators face unique challenges when determining how to oversee the use of open-source code for major tech applications. 

Continue Reading →