Source
DARKReading
A contrarian mindset with applied imagination allows security professionals to assess problems in their organizations, prevent failures, and mitigate vulnerabilities.
If you haven't done so already, it's time to take the first step toward solving this application security dilemma.
Open source software continues to pose a challenge for companies. With the proper security practices, you can reduce your open source risk and manage it.
Nexus, offered in a malware-as-a-service model, is the latest in a vast and growing array of trojans targeting mobile banking and cryptocurrency applications.
With shades of the Cambridge Analytica scandal, German political parties skirted consumer data privacy regulations during the country's last parliamentary election, a privacy watchdog warns.
Help the board understand where the business is vulnerable, where controls end, and where exposure begins.
Enterprise storage devices have 14 security weaknesses on average, putting them at risk of compromise by cyberattackers and especially ransomware attacks.
Cloud-based System of Trust application now available for test-driving quantitative risk assessment of suppliers of hardware, software, services.
Jelle Wieringa analyzes the differences between HDR and security awareness training and how HDR addresses the security layer of human risk management.
Accidentally typing a password in the username field of the platform saves them to audit logs, to which threat actors can gain access and use to compromise enterprise services.