Email is the most attacked vector. And yet many enterprises still have a broad gap between the email gateway and the security operations function. Jules Martin and Joseph Tibbetts of Mimecast discuss how sharing threats between security tools will improve the efficacy of all tools in the ecosystem.
Traditionally, software development training falls short on security. And as enterprises embrace the “shift left” movement, that gap puts them at risk. Veracode’s Dave Ferguson discusses the gap and how Veracode’s new Security Labs was developed to fill it.
It’s time to build security in from the start of the SDLC to better manage,
measure, and address risk, empower development teams, and
guarantee secure software delivery at the speed of DevOps.
While financial service organizations are under constant attack from adversaries, there
are specific steps they can...
Public sector organisations worldwide face a
daunting set of challenges as society adjusts to
the current COVID-19 environment. Whether it is
local government, healthcare, law enforcement,
or blue light responders, organisations across all
disciplines that previously depended on in-person
processes have been...
With millions of sports fans to cater to, DAZN
has secure applications high on its agenda. Security comes from the top (their
c-suite) and rolls down to their software developers who understand the value of
a secure application. Application Security Testing (AST) solutions are imperative to
DAZN, so they deliver...
Just days after Microsoft disclosed four serious flaws in Microsoft Exchange email servers, attackers are going on a wide hunt for vulnerable machines, some security experts say. The flaws could be exploited for creating backdoors for email accounts or installing ransomware and cryptominers.
Monitoring the performance and availability of applications has never been more important.
Today’s DevOps teams are responsible for ensuring high-quality, always-on digital experiences while reliably supporting increasingly frequent - often daily - code pushes.
No one understands this better than Splunk, which...
While the Capital One breach may have been
jawdropping in its sheer scale, there are best
practice lessons to be learned in its remediation
response.
What was overlooked in the Capital One
data breach, and why it could have been
much worse;
How to monitor for security events in a
cloud solution;
What steps...
This edition of the ISMG Security Report features an analysis of key takeaways from the breaches tied to flaws in the Accellion File Transfer appliance. Also featured: Equifax CISO Jamil Farshchi on transforming supply chain security, plus an analysis of how "work from anywhere" is affecting cybersecurity.
Microsoft issued emergency software patches on Tuesday for four zero-day vulnerabilities in its Exchange email server. The alarming vulnerabilities could allow a remote attacker into Exchange and possibly enable further lateral movement.
A pair of U.S. House committees held their first public hearings into the SolarWinds attack, with lawmakers and witnesses offering support for expanding federal cybersecurity laws to address the security failures. This includes a larger role for CISA to conduct threat hunting.
Are Your Applications Secure?
Turn on the news today, and you’ll see how hacks and other cyber threats are wreaking havoc on
businesses across the globe. And, while software security is becoming a higher priority, for many
businesses it’s still an afterthought for most - one-quarter of respondents report their...
Attacks targeting the application layer are on the rise.
Standards and legislation provide incomplete security coverage:
61% of applications had at least one Critical and High Issue NOT covered by OWASP Top 10.
This up 12% YOY, from 49% to 61%.
Open source code has blind spots:
Among the top movers in...
Are you protected from these common AppSec risks?
A single weak point in a line
of code can create an open
door for attackers.
The cost of an average
breach is $3,920,000.
Nearly 80% of apps contain
at least one critical or high
vulnerability.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.