The new release of the OWASP Top 10 list is out from the Open Web Application Security Project, and while most of it remains the same there are a couple of new additions, focusing on protections for web applications and APIs
The digital journey starts with a single step - although destination may vary of course. Why start a digital transformation? Speed/efficiency, enhanced customer experience and security. View this infographic now.
Organizations need to determine the right tools to stay relatively risk free. Open source security vendor Black Duck explains why asking these key questions can help you determine the right mix of application tools and capabilities...
Healthcare is well known as “low-hanging fruit” for ransomware attacks. But according to some experts, artificial intelligence and machine learning, as part of a “layered” security program, can make them a much more difficult target.
The duty to preserve does not cease when an organization migrates data systems. In fact, not only does the duty persist, but it becomes more complex. Corporate legal teams must collaborate with IT to define a migration plan with
With email representing an open, trusted channel that allows malware to piggyback on any document to infect a network, it’s often up to the organizations – their security teams and employees – to adopt appropriate security strategies...
Web application and DDoS attacks hit enterprises without warning or reason. The attacks can expose confidential data and website resources to malicious uses, reduce performance, and render sites unavailable. Responsible organizations
Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system.