Tag "Application Security"

Back to homepage

Protecting applications from malicious scripts

In 2018, malicious client-side scripts are still posing a problem for large organizations. This year, British Airways revealed that they suffered a data breach in which 380,000 records were exfiltrated. Now, NewEgg

Software Uncategorized

What is Blockchain? Everything you need to know

Like much of the technology world, cryptocurrencies such as Bitcoin still rely on some form of database that are able to track large volumes of transactions and keep them secure.The

Industry Insights

Every month should be Cyber Security Awareness Month

In 2004, October was deemed National Cyber Security Awareness Month (NCSAM). This was an initiative promoted by the National Cyber Security Division (NCSD) within the Department of Homeland Security and

Identity Theft

What is IAM? Identity and access management explained

Identity and access management (IAM) in enterprise IT is about defining and managing the roles and access privileges of individual network users and the circumstances in which users are granted


Hook, Line and Sinker: After Phish Get Caught

Phishing is nearly as old as email, but it is still a major attack vector for cybercriminals. Some of the most prominent cyber incidents of the past few years are


For Applications: It’s the Problem, Not the Symptoms

Cloud-based applications have revolutionized the way we do business: they make doing business more convenient for customers and more efficient for companies. Yet, cloud-based service applications may expose user information in ways


Endpoint Security: It’s Way More Complicated than You Think

The term “endpoint security” is often used by vendors and security professionals alike, but what is it really all about? While it might seem obvious that endpoint security by definition


DevOps Producing More Insecure Apps Than Ever

Traditional applications continue to introduce risks into the enterprise, and the number of serious vulnerabilities has increased across most sectors, according to WhiteHat Security. The 2018 Application Security Statistics Report: The Evolution


SQL injection explained: How these attacks work and how to prevent them

There are several types of SQL injection, but they all involve an attacker inserting arbitrary SQL into a web application database query. The good news? SQLi is the lowest of


The Double-Edged Sword of Open-Source Code

While open code repositories can increase efficiency in R&D, they also raise issues of security vulnerabilities. Today’s developers are under pressure to deliver new software at an increasingly rapid pace,