Regardless of what cloud service model you adopt, it's important to consider security implications related to application development, data and contract management, and IT asset governance.
The decentralized nature of blockchain, coupled with consensus protocols, helps to address some security needs, but the consequences can be dire if security isn't fully explored.
Digital criminals tried to impersonate oil and gas companies in a recent attack campaign distributing Shade ransomware.
Like any relationship, DevSecOps works best when there is a solid commitment, open communication and strong resolve in the face of challenges.
Security researchers discovered several Microsoft Windows EXE files using malicious payloads to infect macOS users with infostealers and adware.
The integrity of the applications deployed to your workforce is crucial to enterprise security. The app approval workflow helps you vet these programs and integrate them with existing tools.
By completing the phases of the system development life cycle (SDLC), security teams can integrate processes and technologies into the development process and improve application security.
Researchers at Malwarebytes observed two instances of pre-installed malware targeting critical applications on Android devices.
To ring in the new year, application security teams should resolve to implement more security into the development process, prioritize consumer trust and pay more attention to false negatives.
The enactment of recent privacy mandates is just the start. A comprehensive data risk management program established before more regulations go into effect is well worth its weight in gold.