Admin-level holes in websites are always a bad thing... and for "bad", read "worse" if it's an e-commerce site.
Read moreRed Teaming at Scale to Uncover Your Big Unknowns
March 25 2023A contrarian mindset with applied imagination allows security professionals to assess problems in their organization, prevent failure, or mitigate vulnerabilities.
Read moreIf you haven't done so already, it's time to take the first step toward solving this application security dilemma.
Read moreExploding USB Sticks
March 24 2023In case you don’t have enough to worry about, people are hiding explosives—actual ones—in USB sticks:
In the port city of Guayaquil, journalist Lenin Artieda of the Ecuavisa private...
Read more
Open source software continues to pose a challenge for companies. With the proper security practices, you can reduce your open source risk and manage it.
Read more"Nexus" is the latest in a vast and growing array of Trojans targeting mobile banking and cryptocurrency applications.
Read moreWith shades of the Cambridge Analytica scandal, German political parties skirted consumer data privacy regulations during the country's last parliamentary election, a privacy watchdog warns.
Read moreListen now - latest episode. Full transcript inside.
Read moreListen now - latest episode. Full transcript inside.
Read moreEnterprise storage devices have 14 security weaknesses on average, putting them at risk of compromise by cyberattackers and especially ransomware attacks.
Read more
Recent Comments