Application Security

Application Security news, trend analysis and opinion

1 app hacked
internet security privacy

datarescue matt jones1 100713820 orig

The rising security risk of the citizen developer

Citizen developers may help enterprises to develop apps more quickly, but what is this new breed of developer going to do to enterprise security?

dragon statue head

Can AI and ML slay the healthcare ransomware dragon?

Healthcare is well known as “low-hanging fruit” for ransomware attacks. But according to some experts, artificial intelligence and machine learning, as part of a “layered” security program, can make them a much more difficult target.

green illustration of man and cybersecurity icons

Authentic8 wants to protect users from bad websites

Authentic8's secure web gateway for Silo lets organizations selectively redirect URLs for safe rendering within an isolated browser.

best password managers 1

Is it crazy to be afraid of password managers?

Password managers help users have strong, unique passwords for all their web services. But what happens when the password manager gets hacked?

manometer measure pressure

What makes a good application pen test? Metrics

Research from application security crowd testing and bug bounty program provider Cobalt attempts to define what enterprises could measure to improve results

email encryption

Top 5 email security best practices to prevent malware distribution

With email representing an open, trusted channel that allows malware to piggyback on any document to infect a network, it’s often up to the organizations – their security teams and employees – to adopt appropriate security strategies...

internet security privacy

Information security in an insecure world

A guide for current and aspiring CTOs about the process of securing your data and platforms and receiving security certification

green illustration of man and cybersecurity icons

Smyte wants to get biblical on all those bad online actors

Smyte wants to do some biblical-level smiting of its own and strike down credit-card fraud, scams, spam and other devious online activities.

wikileaks

Now WikiLeaks threatens to disclose software vulnerabilities

One WikiLeaks disclosure condition is similar to Google’s: Companies must patch software vulnerabilities with in 90 days.

Security online

Pwn2Own hacking contest ends with two virtual machine escapes

Two teams of researchers managed to win the biggest bounties at this year's Pwn2Own hacking contest by escaping from the VMware Workstation virtual machine and executing code on the host operating system.

cybersecurity

Pwn2Own 2017: Your stuff as mincemeat

Security teams gathered at Pwn2Own 2017 to hack your favorite software and found plenty of bugs, proving nothing is foolproof.

hacker, hackers, hacking

Adobe Reader, Edge, Safari, and Ubuntu fall during first day at Pwn2Own

During the first day of the Pwn2Own hacking contest, security researchers successfully demonstrated exploits against Microsoft Edge, Apple's Safari, Adobe Reader, and Ubuntu Desktop.

20160225 stock mwc ericsson booth security locks

How much are vendor security assurances worth after the CIA leaks?

Google, Apple, Microsoft and other software vendors are working to identify and patch the vulnerabilities described in the CIA leak, but ultimately this doesn't change the status quo of software security.

phone picture conference

Protecting the enterprise against mobile threats

Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though?

code programming software bugs cybersecurity

Hackers exploit Apache Struts vulnerability to compromise corporate web servers

Attackers are widely exploiting a recently patched vulnerability in Apache Struts that allows them to remotely execute malicious code on web servers.

joomla logo

7 ways to improve your Joomla security

Follow these steps to secure your Joomla website and protect its visitors.

bug bounty

Microsoft paying a bug bounty of $30,000

Microsoft doubles its bug bounty to up to $30,000 for serious bugs in certain Microsoft services. The bounty runs through May 31, 2017.

google cloud plans primary

Checklist for choosing a small cloud host or ISP

Use this checklist to select a cloud host or ISP—and prevent future problems.

Load More