Application Security
More Cyberattacks in the First Half of 2020 Than in All of 2019
A recent study by CrowdStrike showed more cyberattacks in the first six months of this year than in all of 2019 in the network activity of Crowdstrike customers. It's a trend that's ...
Disconnect Your TCL Smart TV From the Internet—NOW
Researchers are sounding the alarm about Android TVs from TCL. A pair of bugs make them serious targets for hackers, and the TVs have a Chinese backdoor ...
One Key Cyber Security Fact
Earlier this year, in March of 2020, CSO Online published an article on the key facts and figures around cyber security for 2020, including the astonishing fact that 60% of attacks were ...
Frost & Sullivan Honors PerimeterX with 2020 Best Practices Award
Independent research firm Frost & Sullivan has recognized PerimeterX for web application security technology innovation ...
Getting Security and Development on the Same Page Through ZeroNorth’s New Defect Density Dashboard
Today, ZeroNorth introduces its new defect density dashboard to help security leaders engage with development leaders… The post Getting Security and Development on the Same Page Through ZeroNorth’s New Defect Density Dashboard ...
Three DevSecOps challenges and how to mitigate them
The shift from DevOps to DevSecOps poses a number of problems for developers. Learn how to overcome the most common challenges in DevSecOps adoption. The post Three DevSecOps challenges and how to ...
ShiftLeft Engineering — Integrating your Go services with JIRA
ShiftLeft Engineering — Integrating your Go services with JIRAHow did ShiftLeft Engineering integrate its Go Services with JIRA to create a stable bidirectional JIRA based workflowAt ShiftLeft, we decided on an aim to empower developers to ...
The Limitations of SASE and Zero Trust
While SASE and Zero Trust work well for applications where it’s easy to identify valid users, these frameworks fail to address two specific areas of concern. The post The Limitations of SASE ...
23% of Windows in Use is Old, Insecure Win7 or XP
Windows 7 and XP are obsolete, but that hasn’t stopped almost a quarter of Windows users using them. It’s a security nightmare waiting to happen ...
Understanding the OWASP Top 10 Web Application Risks
The OWASP Top 10 Web Application Security Risks has become synonymous with web application security. Learn who OWASP is and where the top 10 list began and the other resources OWASP has ...

