Application Security

Application Security news, trend analysis and opinion

update upgrade blackboard public domain
owasp

RSA

Breaking through the cybersecurity bubble

At the recent RSA cybersecurity conference, interoperability and cooperation were a common theme, but not everyone is taking it seriously.

0 shadow it intro

8 steps to regaining control over shadow IT

Learn how to discover those employees who went roaming for outside services.

ciso reporting

3 new information security jobs for the digital enterprise

With digitization comes 3 new IT roles - strategic consultant, product security specialist and dedicated application developer

code programming software bugs cybersecurity

JavaScript-based ASLR bypass attack simplifies browser exploits

Researchers have devised a new attack that can bypass address space layout randomization (ASLR) in browsers and possibly other applications.

medical marijuana sign

Hackers show no mercy—even for pot dispensaries

Anatomy of a national point-of-sale hack and takedown of more than 1,000 marijuana dispensaries

2016 digital transformation

Why managing trust is critical for digital transformation

Businesses planning on staying ahead in digital transformation find traditional methods used to establish trust in the physical world fall short in the digital world.

innovation idea

RSAC Innovation Sandbox winners: One year later

With the annual RSA security conference just around the corner, we decided to touch base with the 10 companies selected as finalists in last year’s Innovation Sandbox competition and see how they’re making out.

01 underattack

How to secure Active Directory

Russell Rice, senior director of product management at Skyport Systems, provides some ways IT organizations can keep privileged credentials for Active Directory safe.

cyber warfare war

How AI is stopping criminal hacking in real time

Almost every day, there’s news about a massive data leak -- a breach at Yahoo that reveals millions of user accounts, a compromise involving Gmail phishing scams. Security professionals are constantly moving the chess pieces around,...

hipaa compliance intro

6 things software vendors need to know about HIPAA compliance

Dizzion provides suggestions for ways vendors can maintain HIPAA compliance while still focusing on their primary business objectives.

cisco logo building

Cisco unveils Tetration 2.0, focuses on application security

Cisco’s Tetration 2.0 focuses on providing security at the application layer, providing a single pane of glass to automate and enforce security policies based on contextual information.

machine learning

AI isn't just for the good guys anymore

Criminals are beginning to use artificial intelligence and machine learning to get around cyber defenses

Black Hat 2015

The CSO guide to top security conferences

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

01 fortified

How fortified is your SAP against security breaches?

Can you even tell if a breach has occurred? Have you inventoried its vulnerabilities - and taken steps to prevent, for example, a $22 million per minute loss due to a SAP breach? Ask yourself these 10 questions to find out if your SAP...

RSA Conference startups

10 Cool Security Startups Vying for Glory at RSA Conference

Hot topics at this year's RSA Conference in February will include cloud security, Internet of Things security and encryption -- and all of those issues unsurprisingly are represented among the 10 finalists announced for the event's...

20151027 oracle cloud on building 100625234 orig

Oracle patches raft of vulnerabilities in business applications

Oracle released its first batch of security patches this year fixing 270 vulnerabilities, mostly in business-critical applications.

adobe systems headquarters san jose

Adobe patches critical flaws in Flash Player, Reader and Acrobat

Adobe Systems released security updates for its Flash Player, Adobe Reader and Acrobat products fixing critical vulnerabilities that could allow attackers to install malware on computers.

code programming software bugs cybersecurity

This tool can help weed out hard-coded keys from software projects

A security researcher developed a tool that can automatically detect sensitive access keys that were hard-coded inside software projects.

Load More