Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit

Moving Security Model From Content To Context

  • Post author:
  • Post last modified:November 27, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:1 mins read
  • Post published:November 27, 2011

In these days I visited several customers to talk about technology trends for 2012. With the occasion I decided to…

Continue ReadingMoving Security Model From Content To Context

Are You Ready For The Next Generation IPS?

  • Post author:
  • Post last modified:October 27, 2011
  • Post category:Security
  • Post comments:1 Comment
  • Reading time:4 mins read
  • Post published:October 27, 2011

Advanced Persistent Threats are changing the information security paradigm and Next Generation IPS will probably be, together with SIEM, the…

Continue ReadingAre You Ready For The Next Generation IPS?

Next Generation Firewalls and Web Applications Firewall Q&A

  • Post author:
  • Post last modified:October 7, 2011
  • Post category:Security
  • Post comments:4 Comments
  • Reading time:8 mins read
  • Post published:October 7, 2011

If I ask to an average skilled information security professional what a firewall is, I am pretty sure that he…

Continue ReadingNext Generation Firewalls and Web Applications Firewall Q&A

Application Security: What’s Next?

  • Post author:
  • Post last modified:April 6, 2011
  • Post category:Security
  • Post comments:3 Comments
  • Reading time:5 mins read
  • Post published:April 6, 2011

In the wake of the infamous LizaMoon which has flooded an impressive number of databases all over the world with…

Continue ReadingApplication Security: What’s Next?
Copyright 2022 - HACKMAGEDDON.COM