Software

Back to homepage

Three essential elements of a successful Zero Trust cybersecurity program

Organizations have traditionally deployed cybersecurity approaches that adhered to the phrase made famous by President Ronald Reagan: “Trust, but verify.” This meant that most users and activities were considered “safe,”

The Top 9 Cyber Security Threats That Will Ruin Your Day

2019’s biggest cyber security threats are and what you can do to avoid them Like a sniper, the most dangerous cyber security threats are the ones you never see coming.

Application Security: Only As Good As the Company You Keep

By John Adams, Chief Executive Officer at Waratek, According to Microsoft chief executive Satya Nadella, in the near future “every business will become a software business.” By leveraging the right

Protecting iOS and Android applications in a fully automated way

In this Help Net Security podcast recorded at Black Hat USA 2019, Dave Belt, Technology Evangelist at Irdeto, and Jaco du Plooy, VP Cloakware at Irdeto, discuss the current threat landscape,

Ransomware attacks hit 1 in 5 Americans

Anomali announced the results of a survey conducted by The Harris Poll. It includes responses from more than 2,000 American adults and reveals how Americans believe business and government organizations

Critical Bluetooth flaw opens millions of devices to eavesdropping attacks

A newly disclosed vulnerability (CVE-2019-9506) in the Bluetooth Core Specification can be exploited by attackers to intercept and manipulate Bluetooth communications/traffic between two vulnerable devices. Researchers Daniele Antonioli, Nils Ole

SOAR vs. Security Operations: What’s Really Going On?

By John Czupak – CEO at ThreatQuotient, There’s something big brewing in the world of security operations, but what exactly is it? We are regularly inundated with various descriptions of

Digital transformation helps companies work smarter yet makes them vulnerable to breaches

While digital transformation helps companies work smarter, there is a risk that the ongoing digitization may unlock a host of security vulnerabilities that can cost companies money, time, intellectual property, and customer

Link between personality type and vulnerabilities to cybercrime

Only four in 10 (42%) businesses focus on compliance training as part of their cybersecurity protocol to ensure sensitive data is kept secure, reports ESET. More worryingly, 63% rely predominantly

Make sure you keep an eye on your APIs

Application programming interfaces have always been important gateways to our applications, but in recent years, they’ve silently become both more prevalent and more central to app functionality. APIs are everywhere