Security firms Crowdstrike, Palo Alto Networks and Sailpoint are making acquisitions to bolster their product portfolios. Here's a rundown of the deals.
A remote code vulnerability in the Android version of the file-sharing app SHAREit could allow hackers to tamper with the app's permissions, enabling them to steal sensitive data, reports security firm Trend Micro.
The Biden administration is reviewing former President Donald Trump's policies addressing potential national security and cybersecurity concerns about Chinese-owned companies as it develops new plans for dealing with a wide range of issues tied to China.
French cybersecurity authorities are warning that widely used, open-source IT monitoring software called Centreon appears to have been hit by Russian hackers. But unlike the SolarWinds supply chain attack, in this campaign, attackers appear to have hacked outdated, unpatched versions of the software.
Automating security has become fundamental to supporting the speed-to-market requirements of modern application development environments. Because these environments vary across teams and organizations, security tooling must be flexible enough to enable the adaptation of security automation based on specific workflows...
SAP has issued a patch and remediation advice for a critical remote code execution vulnerability in its SAP Commerce product that could, if exploited, disrupt the entire system.
E-commerce and fraud - they evolved and grew together in 2020, and it's time for fraud defenses to do the same. Smriti Jaggi of F5 details how to deploy a multi-layered fraud defense without adding extra friction to the process.
Today, bots are a hot topic; one that affects all web applications.
As a result, many vendors are trying to latch onto this trend by claiming to have the ability to identify and mitigate bots. It’s only natural that you’ll want to evaluate the claims of these vendors.
Use these 13 Questions to help...
Your data is the most valuable resource on the planet.
Download this whitepaper to learn how digital transformation is creating new challenges for data security, where you should apply more effective security controls, and what an “Edge-to-End” security posture brings to the modern enterprise.
Several data breaches stemming from unpatched vulnerabilities in Accellion's File Transfer Appliance have been revealed. What went wrong? Where does the fault lie? And what can organizations do about it?
Kubernetes is rapidly becoming the leading container orchestration tool. Shreyans Mehta, CTO and co-founder of Cequence Security shares insights on what's different about Kubernetes and how organizations should be securing it.
Over the past 11 years, Veracode has explored the challenges in secure application development against the backdrop of new threats and evolving expectations in the annual State of Software Security report.
Download the 11th report, and learn how developers can continue along their software development journey to...
As users and applications become the risk focal point, there is no hard and fast perimeter security professionals can put a wall around. Consequently, application layers remain insufficiently secured. In fact, application layer attacks are now the most frequent pattern in confirmed breaches.
Download this guide and...
North Korean hackers have been "targeting security researchers working on vulnerability research and development at different companies and organizations" to trick them into installing backdoored software that gives attackers remote access to their systems, warns Google's Threat Analysis Group.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.