Many IT teams have developed a habit of treating application security as an afterthought. As a result, it might be their greatest vulnerability.
Two decades ago, AOL's Instant Messenger changed the way we communicate. Today, mobile messaging is more popular than ever — but not much more secure.
In today's rapidly evolving security environment, it's imperative for organizations to establish a formal data risk management program that does more than just check the boxes.
To secure products that use open source components, organizations must first take stock of how much of this code they are using in their products.
A recent study from Positive Technologies shined a light on an attack vector that is often overlooked: the insecurity of web applications.
As the workforce has embraced digital transformation, the volume and frequency of mobile threats has skyrocketed. Which threats should your organization be worried about?
A pen test can help organizations identify vulnerabilities in their systems and software before threat actors have a chance to exploit them.
Google pulled 145 Android apps from its Play Store after Palo Alto Networks discovered that they were infected with Windows malware, posing a mobile app security threat to the software ecosystem.
Protecting endpoint-generated data is the name of the game in cybersecurity today. However, increasing shares of shadow IT devices in the workplace are making app security a more significant challenge.
Security remains the primary concern for many CIOs in adopting hybrid IT and cloud technologies as they pursue application modernization.