en flag +1 214 306 68 37

Information Security Blog

Vulnerability Assessment vs. Penetration Testing: Know Who Is Who
Information Security

Vulnerability Assessment vs. Penetration Testing: Know Who Is Who

Vulnerability assessment and penetration testing are often confused. ScienceSoft’s article explains the difference.
Source Code Review vs. Penetration Testing for Web Application Security
Information Security

Source Code Review vs. Penetration Testing for Web Application Security

Learn about source code review and penetration testing. The two approaches help to assess a web application’s security.
Different Types of Penetration Testing and Why You Need Them
Information Security

Different Types of Penetration Testing and Why You Need Them

Information security providers usually offer several types of penetration testing: black box, white box and gray box. What is the backbone of each type? What are the advantages and disadvantages? Let’s take a closer look.
Traffic Pattern Analysis Inside Out
Information Security

Traffic Pattern Analysis Inside Out

A guide to the abilities and limitations of network traffic pattern analysis to detect APT and other security threats.
No Head in the Clouds! How Health Providers Can Avert Cloud Security Breaches
Information Security

No Head in the Clouds! How Health Providers Can Avert Cloud Security Breaches

Cloud data breaches is a major concern for healthcare security specialists. But there are ways to prevent them.
Beat Petya/NotPetya with QRadar® SIEM
Information Security

Beat Petya/NotPetya with QRadar® SIEM

Petya ransomware turned out to be deadlier than its predecessors were. Still, IBM Security is well prepared to mitigate the threat.
Magic Out-of-the-Box – Does It Apply to SIEM Solutions?
Information Security

Magic Out-of-the-Box – Does It Apply to SIEM Solutions?

Our information security consultants give you the checklist to decide whether to replace or just upcycle your out-of-the-box SIEM system
No Wanna – No Cry or the Ways to Prevent Ransomware Attacks
Information Security

No Wanna – No Cry or the Ways to Prevent Ransomware Attacks

There are ways to prevent or, at least, minimize the harm of WannaCry or suchlike attacks, as experts providing information security consulting say.
Detecting APT Activity with Network Traffic Analysis
Information Security

Detecting APT Activity with Network Traffic Analysis

APT protection has recently become a byword as thousands of organizations keep facing network intrusions. The article focuses on network traffic analysis as a major means to detect advanced persistent threats.