Application Security August 25, 2015 What Do Technology Professionals Want in an Application Security Testing Solution? 3 min read - At the most recent Black Hat USA conference in Las Vegas, security experts told IBM what they want out of an application security testing tool.
Application Security August 19, 2015 IBM Maintains Leadership Position in 2015 Gartner Magic Quadrant for Application Security Testing 2 min read - IBM was once again recognized as a "Leader" in the latest version of the Gartner Magic Quadrant for Application Security Testing (AST) report.
Application Security August 18, 2015 Is the Internet of Things Too Big to Protect? Not if IoT Applications Are Protected! 3 min read - The massive growth of the Internet of Things (IoT) is making it harder to secure applications, but organizations can protect themselves via best practices.
Software Vulnerabilities August 10, 2015 One Class to Rule Them All: New Android Serialization Vulnerability Gives Underprivileged Apps Super Status 9 min read - IBM researchers recently revealed details about an Android serialization vulnerability, including recommendations for protecting mobile devices.
Software Vulnerabilities August 6, 2015 Reducing the Application Attack Surface: Breaking Payloads With Runtime Code Stripping and Image Freezing 2 min read - Collaborative research has recently devised a means to reduce a Windows application's attack surface by removing unused functions from libraries that are loaded dynamically.
Application Security July 29, 2015 Static Analysis Security Testing: How to Get the Most From It 2 min read - When used appropriately, static analysis security testing solutions can be an effective part of a security program, but it shouldn't stand alone.
CISO July 27, 2015 Mobile Security: Look Beyond the Device 2 min read - An enterprise-wide mobile security framework needs to protect devices and data, all while ensuring compliance and managing access, as well.
Application Security July 16, 2015 Another 10 Convenient Ways to Increase Your Mobile Application Security Knowledge 4 min read - Enhancing mobile application security doesn't have to take endless time and resources. Catch up on 10 ways you can improve your security knowledge.
Advanced Threats July 15, 2015 Building a Cyberattack: Social Engineering, Zero-Day Vulnerabilities and More 3 min read - Many cybercriminals today use social engineering as a means of carrying out attacks. In fact, this method is among the most popular attack types.
Endpoint July 13, 2015 Mobile Malware Threats in 2015: Fraudsters Are Still Two Steps Ahead 4 min read - Mobile malware threats continue to be a major problem for individuals and enterprises alike, and the risks are only getting more severe.