Please turn on your JavaScript for this page to function normally.
magnifying glass
Organizations that scan applications in production have a reduced risk of being breached

Despite a significantly increased focus on application security testing, remediation rates for vulnerabilities continue to shrink, according to WhiteHat Security. Setu …

AWS
New open source solution reduces the risks associated with cloud deployments

An open source user computer environment (UCE) for the Amazon Cloud, called Galahad, has been launched by the University of Texas at San Antonio (UTSA). The technology will …

building
Supply chain attacks: Mitigation and protection

In software development, a supply chain attack is typically performed by inserting malicious code into a code dependency or third-party service integration. Unlike typical …

Android
Google will check apps by new developers more thoroughly

In an attempt to thwart Android developers who are set to distribute malicious apps through Google Play, Google will be taking more time when reviewing apps by developers with …

G Suite
Google introduces many G Suite security enhancements

Last week, the big news from Google Cloud Next 2019 was that phones running Android 7.0 or higher can be turned into a security key for G Suite account 2-step verification. …

connections
The security challenges that come with serverless computing

Serverless computing (aka Function-as-a-Service) has been a boon to many enterprises: it simplifies the code development and deployment processes while improving utilization …

CyberArk report
Enterprises fear disruption to business critical applications, yet don’t prioritize securing them

The majority of organizations (nearly 70 percent) do not prioritize the protection of the applications that their business depend on – such as ERP and CRM systems – any …

cloud
Less than 20% of IT pros have complete access to critical data in public clouds

Companies have low visibility into their public cloud environments, and the tools and data supplied by cloud providers are insufficient. Lack of visibility can result in a …

Android
The privacy risks of pre-installed software on Android devices

Many pre-installed apps facilitate access to privileged data and resources, without the average user being aware of their presence or being able to uninstall them. On the one …

world
How the Google and Facebook outages could impact application security

With major outages impacting Gmail, YouTube, Facebook and Instagram recently, consumers are right to be concerned over the security of their private data. While details of …

business
SaaS spending increasing by 78 percent year-over-year

43% of the average company’s SaaS application stack changed in the last two years, according to the 2019 Annual SaaS Trends report. This is far greater than the typical …

code
Popular coding advice doesn’t necessarily equal secure coding advice

Stack Overflow is a hugely popular online forum/Q&A site that many programmers and software developers use to find answers to particular programming problems. …

Don't miss

Cybersecurity news