To compete in today's software market, developers are under pressure to build quality code quickly. But DevOps processes that fail to account for application security are bound to miss critical flaws.
IBM X-Force found a zero-day buffer overflow vulnerability in one of the most common routers on the market that could let malicious third parties take control of the device from a remote location.
Security researchers discovered a Magento flaw that could enable cybercriminals to penetrate and control features within the popular e-commerce site without authentication.
If we focus on the future at the expense of performing risk assessments to maintain defenses against existing threats, we will always be one step behind attackers.
Securing IoT projects requires a thorough understanding of your technology infrastructure, its services and components, and how they relate to each other.
Vendors, cybersecurity professionals and marketing teams often use the terms "penetration testing" and "vulnerability assessment" interchangeably, mixing two completely different security engagements.
More than 100 unique exploits of a WinRAR bug have been identified since security researchers discovered a 19-year-old vulnerability in the file compression system.
Many IT professionals and executives alike are not addressing IoT security at the same level at which it's creating tangible business risks.
If your vulnerability management tools do not report on your company's patch posture, you may be missing crucial holes in your software that are ripe for exploitation.
According to IBM X-Force IRIS research, threat actors will continue to search for ways to leverage Spectre, Meltdown and other hardware vulnerabilities to steal data in the coming years.