Apps are a primary target for hackers. If you don't have tools to help you find and fix application vulnerabilities, you're leaving yourself exposed.
But what tools do you need? There's a wide array of application security tools on the market to help you address security risks, and it can be hard to sort out which...
Does your organization do software development in-house? If you'd like to learn more about application security but don't know where to start, this white paper will arm you with development and security fundamentals.
Download this white paper to learn:
Key concepts, terminology, and why DevSecOps and cloud...
The collaboration enabled by Office 365 through file sharing and online services can streamline processes and give your company a competitive advantage and result in faster time to market. But how can people collaborate effectively if their apps are slow to respond, or their video quality is poor, or their connections...
Vulnerabilities due to "coding errors" in a number of mobile banking applications make them all too susceptible to hacking and customer account data theft, the security firm Positive Technologies warns.
Third-party risk management (TPRM) is more important now than ever. The practice extends far beyond "checking the box" for compliance. And while compliance is a critical component, recent market turbulence has organizations prioritizing business continuity, financial due diligence, and business resilience. How can you...
To remain competitive in an environment where data breaches are getting more common, focusing on application security can be a competitive advantage for you.
Download this guide on Application Security to learn:
The key factors involved in having a strong application security posture
What business leaders need...
Worries over ransomware and malware are slowing down enterprise IoT deployments, which is a reflection of the reputational and customer relationship risks at stake, according to a new survey. Here's what enterprises need to keep in mind when selecting security technology for IoT.
An independent security researcher disclosed a zero-day vulnerability contained in the "Sign in with Apple" feature that, if exploited, could have resulted in a full account takeover. The vulnerability has been patched, and Apple says it found no account misuse tied to it.
Don't forget to lock down online shared code repositories, as Mercedes-Benz parent company Daimler AG learned the hard way after a researcher was able to access nearly 9 GB of software development documentation from a misconfigured GitLab repository.
The latest edition of the ISMG Security Report features Retired General Keith Alexander, former NSA director, discussing the long-term security implications of the shift to working from home. Also: an update on ransomware gangs leaking data and an analysis of using open source code for app development.
Apple and Google have released new APIs designed to support contact-tracing apps being developed by governments to help combat the COVID-19 pandemic. Already at least three U.S. states and 22 countries have expressed interest in using the APIs to build their apps.
APIs are increasingly being used to power new customer facing applications, connect with partners and drive microservices environments, but they also constantly expose and exchange sensitive data, making them an increasing target for attackers.
As with all things security there is no silver bullet to protect you...
A recent phishing campaign bypassed multifactor authentication protections within Microsoft Office 365 to steal users' credentials stored in the cloud or launch other attacks, according to the security firm Cofense.
To achieve better network visibility, security practitioners must improve their knowledge of tools that support web services, containers and the evolution of development practices, says Ed Moyle, co-founder of the cybersecurity advisory firm Security Curve.
A sophisticated cyber-espionage campaign using spyware called Mandrake has been targeting Android users for at least four years, according to security firm Bitdefender. The malware has the ability steal a range of data, including SMS authentication messages from banks.