More Cyberattacks in the First Half of 2020 Than in All of 2019

More Cyberattacks in the First Half of 2020 Than in All of 2019

A recent study by CrowdStrike showed more cyberattacks in the first six months of this year than in all of 2019 in the network activity of Crowdstrike customers.  It's a trend that's ...
smart TV

Disconnect Your TCL Smart TV From the Internet—NOW

| | android, china, iot, SB Blogwatch, TCL
Researchers are sounding the alarm about Android TVs from TCL. A pair of bugs make them serious targets for hackers, and the TVs have a Chinese backdoor ...
Security Boulevard
One Key Cyber Security Fact

One Key Cyber Security Fact

Earlier this year, in March of 2020, CSO Online published an article on the key facts and figures around cyber security for 2020, including the astonishing fact that 60% of attacks were ...
2020 Best Practices Award

Frost & Sullivan Honors PerimeterX with 2020 Best Practices Award

| | Application Security
Independent research firm Frost & Sullivan has recognized PerimeterX for web application security technology innovation ...
Getting Security and Development on the Same Page Through ZeroNorth’s New Defect Density Dashboard

Getting Security and Development on the Same Page Through ZeroNorth’s New Defect Density Dashboard

| | Application Security, Blog
Today, ZeroNorth introduces its new defect density dashboard to help security leaders engage with development leaders… The post Getting Security and Development on the Same Page Through ZeroNorth’s New Defect Density Dashboard ...
Three DevSecOps challenges and how to mitigate them

Three DevSecOps challenges and how to mitigate them

The shift from DevOps to DevSecOps poses a number of problems for developers. Learn how to overcome the most common challenges in DevSecOps adoption. The post Three DevSecOps challenges and how to ...
ShiftLeft Engineering — Integrating your Go services with JIRA

ShiftLeft Engineering — Integrating your Go services with JIRA

ShiftLeft Engineering — Integrating your Go services with JIRAHow did ShiftLeft Engineering integrate its Go Services with JIRA to create a stable bidirectional JIRA based workflowAt ShiftLeft, we decided on an aim to empower developers to ...
The Limitations of SASE and Zero Trust

The Limitations of SASE and Zero Trust

While SASE and Zero Trust work well for applications where it’s easy to identify valid users, these frameworks fail to address two specific areas of concern. The post The Limitations of SASE ...
Windows

23% of Windows in Use is Old, Insecure Win7 or XP

Windows 7 and XP are obsolete, but that hasn’t stopped almost a quarter of Windows users using them. It’s a security nightmare waiting to happen ...
Security Boulevard
Understanding the OWASP Top 10 Web Application Risks

Understanding the OWASP Top 10 Web Application Risks

The OWASP Top 10 Web Application Security Risks has become synonymous with web application security. Learn who OWASP is and where the top 10 list began and the other resources OWASP has ...