4 Considerations for a Bug Bounty Program
August 24, 2015
By George Japak, Managing Director, ICSA Labs

I recently read some of the articles about bug bounties and their relative virtues. Some of the comments were thought provoking, controversial and entertaining as they are a departure from comments that are trying to make a marketing statement rather than an avenue for expressing their true feelings on the subject.

Comments

Post new comment

  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <code> <ul> <ol> <li> <dl> <dt> <dd>

More information about formatting options

CAPTCHA
This question is for testing whether you are a human visitor to prevent automated spam submissions.
Image CAPTCHA
Enter the characters shown in the image.
Striking a Balance Between Privacy and Technology -- Navigating the Microsoft 10 “Free” Upgrade
August 18, 2015
By Greg Wasson, End Point Security Program Manager

The widely covered launch of Windows 10 has elicited numerous warnings from privacy advocates and online security experts in recent weeks.  Why?

Comments

Post new comment

  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <code> <ul> <ol> <li> <dl> <dt> <dd>

More information about formatting options

CAPTCHA
This question is for testing whether you are a human visitor to prevent automated spam submissions.
Image CAPTCHA
Enter the characters shown in the image.
Weighing Firewall and Cloud Security Challenges
August 3, 2015
By Brian Monkman, Network Security Programs Manager

Explaining the purpose of a firewall is often very easily answered with a simple analogy: it is like a gatekeeper, border control, or security at the entrance of a building. The firewall’s role is to decide what can pass through your network, and what cannot.

We were asked recently to give a real-world analogy to explain where the cloud resides in this picture – where is the cloud in relation to the firewall? Is it above it? Beside it? Inside it?

Comments

Post new comment

  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <code> <ul> <ol> <li> <dl> <dt> <dd>

More information about formatting options

CAPTCHA
This question is for testing whether you are a human visitor to prevent automated spam submissions.
Image CAPTCHA
Enter the characters shown in the image.
Protecting Your Mobile Phone from Ransomware [PART 2]
July 9, 2015
By Greg Wasson, End Point Security Program Manager

As consumers increasingly turn to their mobile phones for shopping, banking, working and internet browsing, cybercriminals have similarly begun to evolve their tactics to keep up with the growth in mobile phone usage. 

Comments

Post new comment

  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <code> <ul> <ol> <li> <dl> <dt> <dd>

More information about formatting options

CAPTCHA
This question is for testing whether you are a human visitor to prevent automated spam submissions.
Image CAPTCHA
Enter the characters shown in the image.
Protecting your PC from Ransomware [PART 1]
July 7, 2015
By Greg Wasson, End Point Security Program Manager

Ransomware is a type of phishing attack that occurs when an attacker sends an email that looks as if it is from a legitimate organization but contains a link or attachment to malware or ransomware.

Once the ransomware is downloaded it restricts access to the computer system it infects and demands a ransom be paid to the creator(s) of the malware in order for the restriction to be removed.

Unfortunately, even when the ‘ransom’ is paid, most often the system remains infected and needs to be wiped clean.

Comments

Post new comment

  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <code> <ul> <ol> <li> <dl> <dt> <dd>

More information about formatting options

CAPTCHA
This question is for testing whether you are a human visitor to prevent automated spam submissions.
Image CAPTCHA
Enter the characters shown in the image.
Why Certify? The Significance of ICSA Labs Certification
April 20, 2015
By George Japak, Managing Director, ICSA Labs

When it comes to security, many vendors consider certification of its products by an independent organization an option, not a requirement. However, third party testing is an important element when a company is deciding on technology solutions that are part of its security management program.

Comments

Post new comment

  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <code> <ul> <ol> <li> <dl> <dt> <dd>

More information about formatting options

CAPTCHA
This question is for testing whether you are a human visitor to prevent automated spam submissions.
Image CAPTCHA
Enter the characters shown in the image.
ICSA Labs Highlights Key Security Trends Affecting Enterprises and Consumers in 2015
March 3, 2015
By George Japak, Managing Director, ICSA Labs

Security and privacy challenges are top of mind for everyone, as the Internet of Things and mobile device (and associated application) adoption continues to permeate every major industry. I sat down with our security experts at ICSA Labs to learn more about what major security technology trends they see impacting businesses and their customers in 2015. Here’s what they had to say:

Comments

Reply to comment | ICSA Labs

Поручите [url=http://xproggn.net/photo/view/id/1271]ремонт стиральной машины на березняках киев[/url] мастерам

Post new comment

  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <code> <ul> <ol> <li> <dl> <dt> <dd>

More information about formatting options

CAPTCHA
This question is for testing whether you are a human visitor to prevent automated spam submissions.
Image CAPTCHA
Enter the characters shown in the image.
Q&A: George Japak of ICSA Labs Offers Advice around NCSA Month
October 30, 2014
By George Japak, Managing Director, ICSA Labs

This month marks the 11th anniversary of National Cyber Security Awareness Month (NCSAM) where raising awareness about cybersecurity is a top priority for both the public and private sector.

Comments

Post new comment

  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <code> <ul> <ol> <li> <dl> <dt> <dd>

More information about formatting options

CAPTCHA
This question is for testing whether you are a human visitor to prevent automated spam submissions.
Image CAPTCHA
Enter the characters shown in the image.
Testing Built-In Mobile Device Security Functions
October 14, 2014
By Jack Walsh

Mobile device manufacturers build an array of security features into smartphones and tablets. I suspect that the majority of us take for granted that these protections function and we assume that they will work properly when needed (e.g., remote wipe). But will they?

For several years, ICSA Labs has performed mobile device security testing on behalf of several mobile device manufacturers and mobile network carriers. Mobile devices are tested before they are available to users.

Comments

Post new comment

  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <code> <ul> <ol> <li> <dl> <dt> <dd>

More information about formatting options

CAPTCHA
This question is for testing whether you are a human visitor to prevent automated spam submissions.
Image CAPTCHA
Enter the characters shown in the image.
Will the Promise of Hybrid Mobile Apps Outweigh New Security Concerns?
June 16, 2014
By Jack Walsh

The promise and benefit of hybrid mobile apps is that they can operate on many devices from Apple to Blackberry, from Microsoft to Samsung and everything in between. Typically written in HTML5 and JavaScript, hybrid mobile apps include a native container to facilitate access to the device’s native features. Gartner forecasts that hybrid mobile apps will account for half of all mobile apps by 2016.

But are they safe?

Comments

Post new comment

  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.
  • Allowed HTML tags: <a> <em> <strong> <cite> <code> <ul> <ol> <li> <dl> <dt> <dd>

More information about formatting options

CAPTCHA
This question is for testing whether you are a human visitor to prevent automated spam submissions.
Image CAPTCHA
Enter the characters shown in the image.