Governments are increasingly taking control of cybersecurity issues for the citizens and organizations they serve. Just last year, Europe passed the General Data Protection Regulation, or GDPR, which requires businesses who handle European citizen’s data to notify customers if they experience a data breach, as well as report it to the regulatory body. In the
As we dive into June’s biggest hacks and breaches, we begin with OneLogin – a company which allows users to access multiple websites, applications, and services with just a single password. An attacker got hold of highly-sensitive keys for OneLogin’s cloud instance, and successfully in using its front-door key. In a statement released by the
The race to improve software quality and innovation has been around since the 1970s. Many processes and workflows have been created to help address the historical issues that prevent teams from developing high-quality applications quickly and reliably, yet enterprises continue their struggle to keep up.
With cybercrime on the rise, application security remains a massive challenge for organizations and governments across the globe. When it comes to the safety of applications, Penetration Testing (Pen Testing) and Dynamic Application Security Testing (DAST) both remain standing as capable solutions, but both come with a fair share of inherited weaknesses which raise significant
We’ve said it once and we’ll say it again: an organization is only as secure as its weakest link. Most, if not all, of your employees are online and on their mobile devices in your workplace, whether you have a BYOD policy in place or not. Developers release software with millions of lines of code,
The buzzword of the decade is far from just a trend as organizations struggle to keep up with competition. There’s a reason DevOps is so often discussed and highly regarded. As organization after organization makes the switch and reaps the rewards offered by the DevOps culture, it’s time for all those who could enjoy DevOps
It’s only May, and 2017 is well on its way to set a new cyberattack record. As new statistics show, there have been over 1,200 reported data breaches and around 4,800 discovered vulnerabilities released in the first quarter of this year. So, while this post may focus on the month of May – and some
In most organizations, Application Security is sadly behind in adoption, especially when compared to Network Security. And yet, with 84% of attacks aimed at the application layer, we need to turn our focus more towards AppSec. As we use and deploy more and more apps, the interdependencies between them complicate internal infrastructures, leading to more
Major security vulnerabilities have been found in several popular media players – including Kodi, PopcornTime, Streamio, and VLC – have been uncovered in new research released by Check Point. Around 200 million users could potentially be at risk.
The annual Verizon Data Breach Investigations Report (DBIR) was released earlier this month to much anticipation, hitting a big milestone with its tenth-anniversary edition. And once again, it’s proving to be one of the most referenced data breach reports in the cyberworld and a must-read for industry leaders and security professionals across the globe.