Apple is advancing plans to allow Europeans to access third-party app stores via their iPhone and iPad, as will soon be required under European law. What this means in practice for its vaunted walled garden security model, and whether most users will bother, remains unclear.
Staying one step ahead of both threat actors and competitors is a tall task for Palo Alto Networks given the breadth of its cybersecurity portfolio. Palo Alto Networks has committed to having best of breed features and functionality in each of the technology categories where it chooses to play.
Ngrok has closed a $50 million Series A round to provide enterprise-grade authentication and user and session observability without adding complexity for developers or users. Ngrok will use the proceeds to support additional authentication protocols and build out integrations and connections.
Snyk hauled in nearly $200 million just weeks after laying off 198 employees but had to slash its valuation by $1.1 billion to seal the deal. The company intends to use the Series G proceeds to enhance and expand its developer security platform through both organic investments and acquisitions.
Approov has landed a new CEO to help the mobile security upstart expand in the United States and capture more healthcare and financial services customers. The Silicon Valley-based company has captured high-profile European customers such as BMW from its development center in Scotland.
The rapidly expanding environment of e-commerce means the attack surface of the retail industry has grown, making it an even more prominent target for cyber criminals. Retailers have millions of customers, whose information and card data have been the target of cybercriminals.
Download this datasheet to learn...
The traditional application development model that puts security checks at the end of the process creates needless friction that slows down organizations, says Snyk solutions engineer Matt Mintzer. Application security specialists need to build tracks rather than guardrails for development, he says.
Human Security has gone back to the M&A well once again, scooping up a Baltimore startup to prevent adversaries from surreptitiously embedding malware into digital advertisements. The acquisition of Clean.io will help Human take on malvertising, which has become a prolific way to spread botnets.
The holidays are just around the corner to usher in a bustling season of togetherness, shopping, travel, and charitable donations. It’s a special time of year for many of us - including fraudsters and cybercriminals.
Frauds and scams accompany the season as bad actors take advantage of spikes in online activity...
If there’s anything 2022 can teach us, it’s that fincrime Is unpredictable.
This year has been shaped by rapidly changing fraud activities and scams… and increasingly brazen fraudsters. Neither individuals, businesses, government entities, nor financial institutions (FIs) are exempt from the velocity and...
Since web applications and APIs are everywhere and easily probed for weaknesses, they remain the top hacking vector accounting for roughly 70% of security incidents, according to Verizon’s 2022 Data Breach Investigations Report. Hence, it is absolutely crucial for organizations to have a comprehensive solution to...
The shift to the cloud, use of multi-cloud and on-premises environments, and the adoption of DevOps are the key factors making application security more difficult. However, a successful cyberattack can cause major damage to your business. It can affect your customer trust, employee morale, business reputation, and the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.