Archived Articles

Back to Vendor Listings

Trustwave Acquires Application Security Inc.

Trustwave announced on Monday that it had acquired data security provider Application Security Inc., for an undisclosed sum as Trustwave continues its strategy of acquiring security technology vendors to spur its growth. Eleven-year-old Application Security evolved from web scanning and column encryption of databases to a complete database protection company. Competitors include California-based Imperva and Israel-based GreenSQL.…

New Certification Launched for Healthcare Information Security and Privacy Professionals

Insurance fraud. Identity theft. Financial fraud. These are just a few of the risks associated with storing personal healthcare information online. Healthcare organizations hold some of the most private and sensitive information, and if it were to be comprised, a breach of this data could have serious repercussions for individuals and organizations alike. To address…

Can’t Touch This? Researchers Successfully Eavesdrop on Contactless Cards

Contactless card transactions are becoming increasingly popular in the United States, Europe and Asia. In the United Kingdom alone there are some 34.5 million cards in issue with contactless functionality according the UK Cards Association. With contactless payments no signatures or PINs are required for authorization.  This makes transactions under approximately $35 dollars quick, occurring…

YAC/YAM, Log Management, SIEM and Big Data Security Intelligence

Maybe it’s just me, but many market analysts tend to be skeptical about the latest shiny new thing promising the “complete solution” in security and other technology initiatives. Skepticism is fueled by the constant stream of overlapping tools, enhancements and nuanced products promising to do something “more;” but with functionality that ultimately may become features in…

Firmware Attacks on the Uptick

Firmware attacks are growing increasingly popular among software hackers. Despite efforts to issue patches for firmware, reported attacks are on the uptick. For instance, Ruben Santamarta, a security researcher at IOActive, recently posted a blog in which he describes how he directed the firmware of a counterfeit money detector to force the system to literally accept any piece of…