Search Results

Results 1-8 of 8 for Ken Pappas

Tools for Putting Web Apps to the Cross-Browser Test

No two systems are alike, and this holds true for platforms, whetherit's various hardware manufacturers or operating system platforms. The underlying operating systems and their code basesdiffer. "Because of these differences, it is very important thatdevelopers conduct due diligence on their products before releasing tothe general public," Ken Pappas, president of True North Security,told LinuxInsider...

Securing Web Apps: Build Then Patch or Rebuild From Scratch?

"I don't agree that we need to start over and 'build' fromscratch. I am confident that Web and more importantlyapplication-based protection will be a driving technology for manyenterprises. They can't control what's going on within the cloud, butthey can certainly protect the data that is being passed back andforth," Ken Pappas, president of True North Security, told TechNewsWorld. ...

Is There a Dark Cloud Over SSL’s Green Glow?

"There are way too many potential threats to bolster defenses againstevery one of them. Especially with the economy the way it is,companies can't afford to be overly protected against such things,"Ken Pappas, vice president of marketing and security strategist atcomputer security firm Top Layer Networks, told TechNewsWorld...

New App Aims to Plug Holes in Leaky Enterprise Data Hulls

The problem may be worse than many business executives realize. Thefinancial impact to an organization whose data has been stolen averages $202 per record, according toKen Pappas, vice president of marketing and security strategist forTop Layer Security.The average cost per breach is $6.6 million (up from $4.7 million in 2006)...

Getting Firewalls to Play Nice With One Another

Why use more than one firewall? Companies deploy multiple firewalls for at least three reasons, according to Ken Pappas, security strategist with Top Layer Security. Perhaps the most inclusive reason is that no single firewall does everything exceptionally well Another reason ...

EXPERT ADVICE

The Next Generation of Cyber-Threats

With each passing year, hackers come up with new ideas, or variations of past ideas, to combine technology and social engineering to deceive users and attack networks for their financial benefit. The mid-2000s saw the proliferation of botnet attacks used for spam, targeted attacks and worse, while 2007 and 2008 have seen the rise of SQL injection attacks and other Web site exploits as hackers increasingly focus on social networking sites to target millions of users...

Readin’, Writin’ and Web 2.0

For example, consider the experience of Ken Pappas, vice president of marketing and security strategist for Top Layer Networks. He observed this hacking mentality firsthand when he recently took his son to college to start his freshman year. When they entered the dorm room, his son's new roommate was working on a computer...

EXCLUSIVE INTERVIEW

Top Layer Networks’ Ken Pappas: When PCI Compliance Isn’t Enough

With these incidents in mind, TechNewsWorld recently met with Ken Pappas, vice president of marketing and security strategist at computer security firm Top Layer Networks TNW: Why are so many data breaches occurring? The rising number suggests that existing security procedures...

E-Commerce Times Channels