Tags » IT Security

How to extend the list of JWT trusted issuers in Weblogic

wls:/offline> connect("weblogic","<<password>>","t3://localhost:<<admin server port>>")
Connecting to t3://localhost:<<port>> with userid weblogic ...
Successfully connected to Admin Server "AdminServer" that belongs to domain "osb_test_domain".
Warning: An insecure protocol was used to connect to the server. 303 more words
Oracle Fusion Middleware


Over the past few months, mobile ransomware has become more common, and some sites and report it is as much as 200%. This necessitates businesses to change the way businesses think about ransomware, the alternative is seeing Ransomware on the rise again.

Walking away from your desk

This, re yesterday’s post that was in some vincinity (though with quite some distance to spare…) of ranting about bureaucratic stupidity being a pleonasm.
By means of a pic, with: 148 more words

Information Risk Management

AV comparatives report: November 2016 anti-virus performance

Below is a quick view of the results of the AV comparatives anti-virus real world performance report as of November 2016. For those of you who wants the read the digital copy, you can go… 33 more words

PC Section

CACHATTO function video: File server access

Are you aware of how easy it is to access your file server with CACHATTO?

Check out this function video about CACHATTO’s file server feature: 66 more words


Global Data Encryption Market is growing with CAGR of 18% by 2022

Data Encryption Market is seeing tremendous opportunities in the coming future and is forecasted to grow at USD ~4 billion by year 2022 with CAGR of ~18%. 452 more words

2017, Year of the Business Ransomware ?

An article we have published on our thoughts on the direction of Ransomware in 2017 #ITSecurity #beRansomAware