Magecart Campaigns are Targeting e-Commerce Websites
Magecart is Threatening Online Businesses this Holiday Season As we suggested in an earlier blog post, there have been 5,183 breaches from the first nine months of 2019 which exposed 7.9 billion records, both all-time records. The number of breaches is
How the California Consumer Privacy Act (CCPA) Will Impact Business
How the California Consumer Privacy Act (CCPA) will Impact Business In a blog post we wrote a few months back called Four Data Protection and Privacy Laws You Must Know we discussed GDPR, China’s Cybersecurity Law, the Colorado Protections for Consumer
Patch Management Best Practices
Vulnerabilities and Poor Patching Practices Lead to Breaches In our previous blog posts, which discussed the differences between Vulnerability Scans, Vulnerability Assessments, Vulnerability Management and Penetration Tests we indicated how vital these processes and exercises were to eliminating vulnerabilities quickly and
The Difference Between a Penetration Test and Vulnerability Assessment (2 of 2)
What is the Difference Between a Penetration Test and Vulnerability Assessment? Part 2 of 2 Comparing Penetration Tests and Vulnerability Assessments In part 1 of this post, we focused on the Vulnerability Scans, Vulnerability Assessments, and Vulnerability Management in order to differentiate the
The Difference Between a Penetration Test and Vulnerability Assessment (1 of 2)
What is the Difference Between a Penetration Test and Vulnerability Assessment? Part 1 of 2 Comparing Penetration Tests and Vulnerability Assessments The staff here at SecureOps is consistently asked the purpose and the differences between vulnerability scans, vulnerability assessments and penetration tests -