Author: admin

Technology giant Google and its parent company, Alphabet, Inc. could soon be poised to pay billions of dollars in damages related to its use of Java programming code and a resulting copyright dispute with Oracle Corporation.

Google closer to paying multi-billion-dollar Java API copyright settlement

Technology giant Google and its parent company, Alphabet, Inc. could soon be poised to pay billions of dollars in damages related to its use of Java programming code and a resulting copyright dispute with Oracle Corporation.

Continue Reading
Java's structural flaws have been openly laid bare on multiple occasions. Ineffective patching is typically the root cause of large-scale Java breaches such as these but what if mending porous code is not enough?

Why patching vulnerable Java architecture is not enough

Java’s structural flaws have been openly laid bare on multiple occasions. Ineffective patching is typically the root cause of large-scale Java breaches such as these but what if mending porous code is not enough?

Continue Reading
Keeping an eye on recent notable Java vulnerabilities

Keeping an eye on recent notable Java vulnerabilities

It’s important to always stay on top of new vulnerabilities affecting Java and other open-source programming languages. 

Continue Reading
Understanding the full scope of modern cybersecurity risks

Understanding the full scope of modern cybersecurity risks

Many of our most trusted systems are vulnerable to cyberthreats, and there’s no reason to think the average business is immune. 

Continue Reading
Security issues continue to surround open source development

Security issues continue to surround open source development

Considerable vulnerabilities still exist in the arena of open source software. 

Continue Reading
Major concerns for industrial cybersecurity

Major concerns for industrial cybersecurity

Industrial cybersecurity involves unique challenges for IT personnel.

Continue Reading
New facts emerge regarding CBP data breach

New facts emerge regarding CBP data breach

The data breach that caused CBP border checkpoints to reveal photos of individuals crossing the U.S.-Canada border turned out to be more serious than what was initially reported. 

Continue Reading
June marked by private- and public-sector data breaches

June marked by private- and public-sector data breaches

Some high-profile data breaches occurred in the first few weeks of June. 

Continue Reading
Issues continue to surface with Java Card

Issues continue to surface with Java Card

Oracle’s Java Card technology is found in countless smart card and SIM applications, but is it going to provide real security for your business?

Continue Reading
The complex, ongoing conundrum of Java

The complex, ongoing conundrum of Java

Determining whether or not to use Java can be difficult for some organizations, given the continued debates over its risk or lack thereof. 

Continue Reading