Web App Security

6fe4d99c3f5787c7098e67eb3c9161fd

Through the Executive Lens: Prioritizing Application Security Vulnerabilities

March 28, 2019 Added by:Neal Goldman

By focusing on specific AppSec initiatives and applying well-tested strategies and tools, you can prioritize the most important issues to focus on.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Internet-Exposed IBM BigFix Relays May Lead to Full Remote Compromise

March 21, 2019 Added by:Ionut Arghire

Internet-facing relays in IBM BigFix deployments could lead to information disclosure and potential full remote compromise if not properly configured, Atredis Partners security researchers have discovered.

Comments  (0)

4fffaa4acdf2dde64272fc40fe7c0f99

OWASP: What Are the Top 10 Threats and Why Does It Matter?

January 30, 2019 Added by:Nitzan Miron

Since the founding of the Open Web Application Security Project (OWASP) in 2001, it has become a leading resource for online security best practices.

Comments  (0)

368febea925e4f73f6df3d1fa3c8d577

Four Technologies that will Increase Cybersecurity Risk in 2019

January 17, 2019 Added by:Srinivas Mukkamala

While advances in technology provide many benefits, they also open new threat vectors and the potential for attacks that can spread quickly over connected ecosystems.

Comments  (0)

9ae0fe776de46500a4f71f32673fad0f

IAST Technology Is Revolutionizing Sensitive Data Security

January 08, 2019 Added by:Asma Zubair

IAST is the most optimal way to test for application security, sensitive data leakage, and prevent breaches.

Comments  (0)

Fa42af438e58b799189dd26386f5870f

Chrome 71 Patches 43 Vulnerabilities

December 07, 2018 Added by:Ionut Arghire

Google has released Chrome 71 to the stable channel with 43 security fixes inside, as well as with a series of additional protections to improve the overall user experience.

Comments  (0)

B62486f17abbb685a2012b729dc70376

What You Need to Know about the Recent Apache Struts Vulnerability

November 05, 2018 Added by:Tushar Richabadas

Researchers recently revealed a vulnerability in Apache Struts, a popular type of enterprise software. Active exploit attempts weren’t far behind.

Comments  (0)

D5cad47c94727a4c525129559ae89d17

CVE-2018-11776 — The Latest Apache Struts Vulnerability

September 04, 2018 Added by:Fred Bals

A Critical security flaw (CVE-2018-11776) impacts Apache Struts 2.3 through 2.3.34, Struts 2.5 through 2.5.16, and possibly unsupported versions of the popular Java framework.

Comments  (0)

53c787f0dd688c758b5610aa09af8f13

How Secure Are Popular Finance Apps on Google Play?

September 04, 2018 Added by:Min Pyo Hong

Analysis of the top free Android finance apps on Google Play revealed critical, medium and low security vulnerabilities.

Comments  (0)

0b8e9d7009308c174e700bcaf89c4474

Q3 Oracle CPU Preview: Fewer Java SE Patches May Not Mean Fewer Flaws

July 16, 2018 Added by:James Lee

The July 2018 quarterly Oracle Critical Patch Update (CPU) is expected to set a new two-year high for total Oracle product patches.

Comments  (0)

D47111ebac9e529cc7e382f0f095f32b

"Can you Hear Me Now?” - Security Professionals Warn about Who May Be Listening

June 27, 2018 Added by:Jeannie Warner

In light of the recent move by Verizon to stop sharing location data with third parties, companies need to rethink strategies for data gathering from users.

Comments  (0)

0a36f423b9a230eb25d9f024fb71c03c

Machine Learning vs. Deep Learning in Cybersecurity – Demystifying AI’s Siblings

June 13, 2018 Added by:Guy Caspi

To fully understand “machine learning” and “deep learning,” it’s worth taking a look at each subfield’s advantages and limitations.

Comments  (0)

B5e8617f76698eb78f0101a3db9326ae

Achieving Effective Application Security in a Cloud Generation

May 16, 2018 Added by:Jonathan Bregman

Cloud application security requires new approaches, policies, configurations, and strategies that both allow organizations to address business needs and security risks in unison.

Comments  (0)

6648b1abd4a9b964566c3690613f20a6

GDPR Is Coming. Is Your Organization Ready?

May 01, 2018 Added by:Mark Baldwin

The General Data Protection Regulation (GDPR) that goes into effect on May 25 affects any business that processes information of any EU citizen, regardless of whether the business is located in or has operations in the EU.

Comments  (0)

9d9e32000b07da9c5acd1ad33accbbb6

Advancing the Usability of PKIs

February 06, 2018 Added by:Dan Timpson

If your organization is going to rely on PKI, it’s important to also leverage the benefits that automation can provide.

Comments  (0)

9ae0fe776de46500a4f71f32673fad0f

Increasing Importance of Mobile Makes Malware a Priority

January 17, 2018 Added by:Asma Zubair

Businesses should fortify their high value apps with additional security precautions from the inside out.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked