Application Security and DevOps

Application Security and DevOps: Q&A with Author Kenneth Van Wyk

Application security is one of the most important topics in information security, and few know the subject better than Kenneth Van Wyk. He has been a career IT security expert for more than 30 years and specializes in both incident response and software security. Van Wyk has authored two popular ... Read More
Security Boulevard
Mobile Fraud, Threats Soar

Study Finds Mobile Fraud, Threats Soar

| | mobile data security
When asked by a reporter why he robbed banks, American bank robber Willie Sutton reportedly answered, “Because that’s where the money is.” While there is some controversy as to whether he actually made the statement, it’s a truism nonetheless and there’s even a diagnosis law named after the famous quote ... Read More
Security Boulevard

Enterprises Still Struggle to Put the Sec in DevOps

|
Despite it being considered an essential practice, most organizations still find it difficult implementing security into their DevOps efforts. It’s not that they don’t want to, they say they do, it’s that they just haven’t provided their developers the tools, processes, or even training to get it done. These are ... Read More
Data Breach Notification Laws

Data Breach Notification Laws: Is it Time for a Uniform Standard?

State data breach notification laws had two primary aims in mind. The first was to potentially embarrass organizations to improve their data security by forcing them to disclose certain data breaches publicly. The second was to help consumers have a fighting chance against identity theft by arming them with the ... Read More
Security Boulevard

A Real-world Deep Dive into the Top Cloud Threats

|
For years now, the cloud computing alliance has been working to identify the top threats to cloud computing. In 2012 they published a survey that identified the top threats to cloud at the time, and two years ago they published The Treacherous 12 Cloud Computing Top Threats in 2016. That ... Read More

Researchers Find Power Grid, IoT Device Security a Dangerous Mix

|
Smart connected appliances, should they be commandeered by attackers for use in a botnet, could result in everything from local power outages to severe wide-scale blackouts a team of Princeton University researchers contended at the USENIX Security Symposium ... Read More
Web Apps Reveals Security Threats

Analysis of Web Apps Reveals Current Top Security Threats

| | web app security
Thirty-four days. That’s how long it takes for the average organization to patch a high-severity web application vulnerability according to a study of more than 316 million security incidents released recently by web application security provider tCell. The report, “Security Report for In-Production Web Applications,” analyzed real-world cloud-based web application ... Read More
Security Boulevard

Retail Industry Still Struggles With Cybersecurity

|
For two decades now, online attacks targeting retailers have been on the rise. According to a new report from 451 Research and data encryption and tokenization provider Thales, last year was no different ... Read More

Security Lessons Learned from the Mueller Indictment

|
The dust is beginning to settle after the U.S. federal criminal indictment of 12 Russian military intelligence officers who are alleged to have conspired to hack into systems of the Democratic Congressional Campaign Committee (DCCC), Democratic National Committee (DNC), and volunteers of the Hillary Clinton campaign. As the implications of ... Read More

FTC Seeks Stronger Cybersecurity Enforcement Powers

|
The Federal Trade Commission (FTC) wants increased power and regulatory authority, including the ability to enforce civil penalties, when it comes to data security ... Read More
Loading...