1.888.749.9800

Monthly Archives: April 2016

The Internet of Things (IoT); what’s to worry about?

Submitted by Brad Johnson and Paul Hill

There is no doubt that the concept of the Internet of Things (IoT), a term that’s been around since 1999 from an Auto-ID Center project at MIT, is gathering huge momentum and will be stampeding into your world whether you are ready for it or not. IoT is simply […]

By |April 29th, 2016|Blog, Security Breach|Comments Off on The Internet of Things (IoT); what’s to worry about?
  • Permalink Gallery

    Is the Panama Paper leak saying anything new about IT security?

Is the Panama Paper leak saying anything new about IT security?

The Panama Paper leak is an example of a whistleblower situation. Clearly, some of those types of situations have been seminal events that have shaped history, policies and perceptions: e.g., Daniel Ellsberg and the Vietnam War, “Deep Throat” and Watergate, and Julian Assange of WikiLeaks to name a few. The up-side of these is that it creates a degree […]

By |April 20th, 2016|Blog, Security Breach|Comments Off on Is the Panama Paper leak saying anything new about IT security?
  • Permalink Gallery

    5 important web application security trends of the near future

5 important web application security trends of the near future

by Joe Stangarone, writer, MRC’s Cup of Joe Blog, April 19, 2016

Summary: As security breaches rise, enterprise web application security is an increasingly important topic. You must stay ahead of evolving security trends in order to keep your data and applications safe. How will web application security evolve in the coming year? What web application security threats can we […]

By |April 19th, 2016|News & Events, Security Breach|Comments Off on 5 important web application security trends of the near future

What’s Ethical Hacking?

Often in social situations, when people ask what I do for living, I have to pause for a moment.  If I want to deflect the conversation, I just say “computer security” and their eyes usually glaze over and we move on to other topics.  However, if I’m honest and say “ethical hacking,” this invariably arouses more interest. […]

By |April 7th, 2016|Blog, Penetration Testing|Comments Off on What’s Ethical Hacking?