AppSec
Understanding the 2019 Capital One Attack
Learn about how the Capital One attack was carried out, why Web Application Firewalls failed to prevent the attack, and how the attack could have been prevented. The post Understanding the 2019 ...
How a Healthcare Leader Unlocked the Secret to Exceptional Patient Care
Technology is transforming the way healthcare organizations deliver patient care. As people continue to hold their… The post How a Healthcare Leader Unlocked the Secret to Exceptional Patient Care appeared first on ...
90% of Companies Faced Increased Cyberattacks During COVID-19
A recent global study by Tanium of 1,000 CXOs reported on the effects of COVID-19 on enterprise and government organizations. 90 percent of those surveyed said they experienced an increase in cyberattacks ...
New Study Says Cyber Security Technology Isn’t as Effective As It Should Be
A new study by Debate Security finds that the efficacy problems in cyber security are more related to economic issues rather than technology issues. It found that companies when evaluating which cyber ...
Why Do Zero Day Security Technologies Fail to Protect Against Zero Day Attacks?
Today's security technologies fail to detect true zero day attacks, K2 has a video that explains why these security technologies fail to protect against zero day attacks and the need for deterministic ...
More Cyberattacks in the First Half of 2020 Than in All of 2019
A recent study by CrowdStrike showed more cyberattacks in the first six months of this year than in all of 2019 in the network activity of Crowdstrike customers. It's a trend that's ...
5 Irrefutable Reasons to Prioritize Software Security
These days, technology is evolving at a pace like never before seen, forcing organizations into an “adapt or die” situation. And, as digital transformation accelerates, everyone is feeling the effects. DevOps leaders, ...
One Key Cyber Security Fact
Earlier this year, in March of 2020, CSO Online published an article on the key facts and figures around cyber security for 2020, including the astonishing fact that 60% of attacks were ...
The Limitations of SASE and Zero Trust
While SASE and Zero Trust work well for applications where it’s easy to identify valid users, these frameworks fail to address two specific areas of concern. The post The Limitations of SASE ...
Understanding the OWASP Top 10 Web Application Risks
The OWASP Top 10 Web Application Security Risks has become synonymous with web application security. Learn who OWASP is and where the top 10 list began and the other resources OWASP has ...

