Does your organization do software development in-house? If you'd like to learn more about application security but don't know where to start, this white paper will arm you with development and security fundamentals.
Inside you'll find:
Key concepts, terminology, and why DevSecOps and cloud development matters
The...
Running Kubernetes? Explore service mesh to simplify the process of connecting, protecting, and monitoring your microservices. A service mesh is an abstraction layer that takes care of service-to-service communications, observability, and resiliency in modern, cloud-native applications.
In the Service Mesh Dummies...
Adobe Flash Player, which has been patched hundreds of times during its lifetime to address vulnerabilities, will no longer be supported after Dec. 31, leaving an attack vector that can be exploited by malicious actors unless it's removed. That's why eliminating all instances of Flash Player is so urgent.
Mobile banking startup Dave is just the latest victim of criminal data brokers. Extensive evidence now points to Dave having been hit by a ShinyHunters, which has been tied to the sale of millions of stolen records to fraudsters - either via a phishing attack or hack of a third-party service provider.
Mobile-only banking app Dave has suffered a data breach that exposed personal details for at least 3 million users. But the fintech startup says no account information was exposed, and there are no signs of fraud. Dave says the incident traces to credentials stolen from Waydev, a third-party service provider.
The latest edition of the ISMG Security Report analyzes the hacking of high-profile Twitter accounts. Also featured: Addressing security when offices reopen; the role of personal protective equipment, or PPE, in money laundering during the pandemic.
When it comes to finance, mobile banking or payments apps, maintaining customer trust is crucial to protecting brand equity and revenue. But according to recent analyst research, a majority of mobile finance apps lack the security controls and code hardening necessary to prevent applications from being compromised....
A group of spoofed cryptocurrency trading apps is targeting devices running macOS to install malware called Gmera, security firm ESET reports. The malware can steal users' data as well as their cryptocurrency wallets.
COVID-19 contract-tracing applications that help monitor individuals' possible exposure to those who have tested positive for the virus present a variety of privacy issues that must be addressed, says regulatory attorney Nancy Perkins.
Is the difference between network security and web application security a bit of a puzzle for you? If so, you're not alone.
This topic is now more important than ever because the majority of cyberattacks and data breaches are related to web applications. If you're using the freebie web application scanner bundled...
The lessons of the Mirai botnet's abuse of internet-connected devices four years ago have been taken to heart, says Aaron Guzman of OWASP, which is working with others to improve security benchmarks and testing for connected devices.
Based on real-world scenarios and written by industry experts who have been in the trenches, Secure Beyond Breach is a practical guide that details how to implement a successful micro-segmentation strategy from start to finish.
Download this essential read for all cybersecurity professionals, from security...
Apps are a primary target for hackers. If you don't have tools to help you find and fix application vulnerabilities, you're leaving yourself exposed.
But what tools do you need? There's a wide array of application security tools on the market to help you address security risks, and it can be hard to sort out which...
Does your organization do software development in-house? If you'd like to learn more about application security but don't know where to start, this white paper will arm you with development and security fundamentals.
Download this white paper to learn:
Key concepts, terminology, and why DevSecOps and cloud...
The collaboration enabled by Office 365 through file sharing and online services can streamline processes and give your company a competitive advantage and result in faster time to market. But how can people collaborate effectively if their apps are slow to respond, or their video quality is poor, or their connections...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.