Business email compromise (BEC) continues to grow year after year, now making up 35% of all cybercrime losses. By exploiting the relationships people have established with their executives, coworkers, and partners, business email compromise attacks dupe both traditional email security tools and the humans they target....
This case study presents an organization that transformed its global business operations to deliver “digital everything” for its workforce and customers.
The AVP of Security Operations said: “as we move into a ‘digital everything’ world, protecting our customers and employees is the top priority. We’re...
Federal authorities are advising healthcare entities to fortify their defenses against cyberattacks involving web applications, including patient portals, telehealth services and webmail. Such apps offer hackers many potential entry points into an organization, they warn.
At a time when applications are more business-critical than ever - and visibility is more challenging to achieve - we need to discuss new strategies and tools for maximizing application intelligence.
In this eBook, Sujay Pathakji of Axiom Telecom and Srudi Dineshan of Gigamon share insights on how to:
Improve...
The apps your dev teams are building have changed, your security tools should too. Digital transformation, omnichannel marketing and directly connecting with customers among other key business imperatives have accelerated application development cycles. Development teams have widely adopted agile development practices...
Faster, smarter, and more secure: these are the
demands driving application development today
as the cloud delivers exciting opportunities
to create and deploy advanced software at a
previously unimaginable pace. Free from the
shackles of on-premises infrastructure, the
potential is limitless, and providers like...
We’re not pointing any fingers here, but 46% of organizations knowingly push vulnerable code to meet a deadline. This isn’t only Security’s problem or only Development’s fault, and it doesn’t have to be this way!
Bridging this gap is about seeing how aligned the interests of these teams are – which is...
One key pain point for many companies today is configuration. The way to lift and shift configurations is time-consuming, error-prone, and often leads to costly application downtime.
This webinar will uncover how our Citrix to F5 migrator will automate the migration process, enabling you to achieve device/object...
In 2021, Mandiant Threat Intelligence identified 80 zero-days exploited in the wild, which is more than double the previous record volume in 2019. State-sponsored groups continue to be the primary actors exploiting zero-day vulnerabilities, led by Chinese groups.
Join Mandiant’s Erin Joe, SVP of Strategy and...
Police in Nigeria this week arrested a 37-year-old man who's been charged with masterminding "a criminal syndicate tied to massive business email compromise and phishing campaigns," Interpol says. But with known BEC losses last year exceeding $2.4 billion, will the arrest have a noticeable impact?
An increasing number of threat actors are deploying a free-to-use browser automation framework as part of their attack campaigns. Automation tools are expected to become a more common element of the threat actor’s toolkit, according to researchers at security firm Team Cymru.
WhiteSource has renamed itself Mend as the company pushes beyond software composition analysis to become a broad application security platform with automated remediation. The name WhiteSource didn't have any negative connotations when the company was founded, but some people today find it offensive.
Today, organizations must acknowledge the lists of well-known software risks provided by OWASP, SANS, and others, but an entirely new set of risks also emerge in Modern Application Development (MAD) initiatives.
This eBook expands on each of these risks. Check out this eBook to know in depth about:
Open source...
Software is running the world – and it is everywhere. More and more elements of major businesses and industries are being run on software and delivered as online services. So much of the software on which the world depends is open source software.
Explore this white paper to understand dependency integrities...
In a world that has evolved on the physical and logical underpinnings of the internet, we’re completely dependent on software applications (apps) that run nearly every aspect of our lives.
Amid the obligations to revolutionize, modern application development (MAD) was spawned and has since grown beyond its...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.