Posts Tagged 'security'

The credit card is a powerful tool — it’s thin, portable, and, thanks to a small magnetic strip on the back of the card, gives you immediate access to credit or cash at a moment’s notice. While the concept of credit and charge cards has been around for ages in various forms, it wasn’t until […]

Software tools are available from our consultants free of charge.  When our Foundstone consultants are working at customer sites, they sometimes realize that they can perform a task better if they write some code. They might want a tool that scans for vulnerabilities or malware, helps with forensic analysis, or tests security settings.  After the […]

How to identify the appropriate security for your container-based virtual applications.  Virtual machines and containers are similar but distinct ways of virtualizing infrastructure to deploy applications. And they have similar but distinct needs for securing those applications. Virtual machines are the most separate and secure method of virtualizing hardware, enforced by hardware. Each virtual machine […]

Automation is key to shorter response times and better containment. Breaches to the right of you, Breaches to the left of you, Breaches in front of you, Broken and plunder’d. (With apologies to Alfred, Lord Tennyson) Hopefully your security outlook is not as bleak as the ill-fated “Charge of the Light Brigade.” Sometimes it may […]

The pace and advances in technology are greatly outstripping the capacity of government to effectively regulate. I have been speaking with senior security professionals around the world, asking about their top issues and priorities for the coming year. I was somewhat surprised that they only had one thing in common: the issue of security and […]