Malicious actors are bundling a Trojan called Pirate Chick, which looks like a virtual private network (VPN) software tool, into adware to install malware on infected machines.
Containerization empowers businesses to move apps across different platforms and environments. Here's why security best practices need to evolve.
A threat group known as Barium is exploiting trusted software updates and apps to conduct a wave of supply chain attacks, which could affect more than 1 million users around the world.
Whether you're a small startup or an international enterprise, a successful application security program involves more than just scanning for vulnerabilities.
When developing and deploying internet of things solutions, achieving security by design is not as simple as picking a secure development life cycle (SDLC) framework and shifting your security left.
Until now, we've looked at the cybersecurity skills gap in a very broad sense, as if all security jobs and needs are equal. Maybe it's time we look at the skills gap problem in different ways.
How an organization handles application security goes a long way in determining whether it will be "taxed" by vulnerabilities in production or receive a nice refund of their customers' trust.
To avoid malware, always get hardware and software from authorized and reputable sources and vendors, right? But what happens when those same sources actually contain or deliver malicious payloads?
To compete in today's software market, developers are under pressure to build quality code quickly. But DevOps processes that fail to account for application security are bound to miss critical flaws.
Businesses that want to advance cloud security at scale need to invest in both the people and the technology that will reduce risks.