Tag "Application Security"

Back to homepage
Software

Web Application Security Poses Greatest Risk

The majority of vulnerabilities in 2018 were associated with network vulnerabilities, while less than 20% were associated with web applications and APIs, according to the fourth annual Vulnerability Stats Report from Edgescan. When

Software

Increased appetite for biometrics fueled by speed, security and convenience

The Biometric Consumer Sentiment Survey of more than 1,000 U.S. adults who have experience using biometrics to log into their accounts, reveals an increased appetite for the technology. 70 percent

Hardware/Network

Attackers repackage popular Android VPN app with Triout malware

Triout malware was first detected in August 2018 which infected Android applications and had spyware capabilities such as recording phone calls and text messages, and more. Recently, the malware was

Software

DevOps and DevSecOps developments to watch in 2019

Some predictions are more accurate than others. Last year, I was sure that serverless would finally overtake containers—but then 2018 turned out to be the year of Kubernetes. In the San Francisco

Software

The Benefits of Correctly Deploying a PKI Solution

With new threats to data emerging every day, public key infrastructure (PKI) has become an increasingly larger part of enterprises’ information security and risk management strategies. Research has found that 43% of

Software

What is application security? A process and tools for securing software

Checking for security flaws in your applications is essential as threats become more potent and prevalent.Application security is the process of making apps more secure by finding, fixing, and enhancing

Software Uncategorized

The State Of Web Application Vulnerabilities In 2018

Web application vulnerabilities have been around for years and are often caused by application design flaws and misconfigured web servers. These vulnerabilities can be easy targets for hackers looking to

Industry Insights

Shadow IT, IaaS & the Security Imperative

Organizations must strengthen their security posture in cloud environments. That means considering five critical elements about their infrastructure, especially when it operates as an IaaS. Shadow IT, the use of

Industry Insights

Shutdown a Threat to IT Security Recruitment

As the US inches toward a full month of a government shutdown, concerns over the impact on national security and cybersecurity continue to mount, and according to security experts from Juniper

Cloud

Four Cloud Security Predictions For 2019

The cloud is a vital part of any enterprise infrastructure. The convenience of having a database that can be accessed from any location has dramatically improved efficiency within workforces. While