3 min read - The Tortoise and the Hare are challenged to develop an app, and the winner must consider both application security and functionality. Who will prevail?
3 min read - Although it is one of the most crucial components of any security strategy, web application penetration testing is often neglected.
3 min read - Is your network prepared to handle the IoT? Start by focusing on your application security program, since many IoT threats lurk in the application layer.
2 min read - The WhatsApp Web client is now vulnerable to a vCard-led attack, according to researchers. How can users patch the vulnerability and avoid the issue?
3 min read - IBM research has found that cyber criminals are exploiting media player vulnerabilities to infect users' workstations with malware.
4 min read - What can we do to help developers learn about preventing incidence of SQLi vulns in their production applications? And what can we do about SQLi in legacy web applications or newer apps that were developed with SQLi vulnerabilities? This is…
4 min read - Even security-savvy users can fall for fake social engineering attacks through malicious emails sent by cyber criminals to install malware.
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats.