Defense In Depth

What is Defense in Depth?  It can be defined as the use of multiple computer security techniques to help mitigate the risk of one component of the defense being compromised or circumvented. Securing your enterprise properly can seem like an insurmountable task to many. Frequently, information networks are protected by a single firewall in hopes that… Read more »

SecurePaaS Roadmap Announced at Red Hat’s 2016 Summit

Atlanta, Georgia & San Francisco, CA (PRWEB) July 03, 2016 Today at Red Hat Summit, Shadow-Soft announced an official roadmap for their IAAA security solution, SecurePaaS. The new features that were announced for SecurePaaS include support for Microsoft .Net and protection against SQL Injection and Cross Site Scripting. “Supporting Microsoft .Net and protecting against newer… Read more »

Perimeter Security Problems

Cyber Security is poised to be among the most complex and expensive business challenges for the foreseeable future.  Just a few short years ago, tossing a firewall up, performing system patching, and monitoring was considered an appropriate strategy – but times have changed.  Now, network security and IT security in general have evolved into a… Read more »