To address security gaps in the energy industry, organizations must empower leaders to take full responsibility for cyberdefense and hold them accountable.
To protect their WordPress sites from scammers, administrators must proactively patch and monitor their installations to weed out unwanted content.
It took fraudsters less than 24 hours after the disclosure of a previously unknown Apache Struts 2 vulnerability to develop a Python script to exploit it.
Application security testing is the only way to prevent open source vulnerabilities from becoming a huge problem in the enterprise.
The disclosure of an Apache Struts 2 vulnerability made the framework a lucrative target and highlighted the importance of patch management.
To properly manage risk, security analysts must understand the threats and vulnerabilities that exist on their networks and assess their consequences.
Although security researchers discovered Shellshock more than two years ago, it remains popular among fraudsters with basic skill sets and light wallets.
Although remediation and security teams are working toward a common goal, their conflicting priorities, culture and tools often lead to discord.
The SAP HANA security evolution started in 2011, peaked in 2014 and continues to deliver critical enhancements to provide analysts with greater visibility.
The IBM X-Force Application Security Research Team discovered an arbitrary write vulnerability in Nexus 9's kernel, putting application data at risk.