After 15 years, the OWASP Top 10 list remains largely the same
It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.
Their granularity, deployment speed, and data traffic volume require new approaches to securing container environments.
Today’s cyberattack lifecycle is short, unpredictable, and often with brutal results.
To protect the edge, enterprises should move toward architectures that will protect applications even if the infrastructure is compromised.
Power supplies, cooling systems, even security systems themselves can all be entry points for attackers.
No amount of planning can replace regular drills. Here’s what they should include.
DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.
Serverless applications increase the attack surface by introducing privilege escalation and application dependencies.
Colo provider first to market among peers with encryption service based on Intel’s cutting-edge SGX tech.
Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm.
Using open source components saves developers time and companies money. In other words, it’s here to stay. Here’s a look at what it will take to improve open source security.
Without a vendor behind it, open source software takes a deliberate effort by IT to secure it.
Post Equifax, those who hoped that the US Securities and Exchange Commission would impose tougher rules (and consequences for breaking them) around reporting breaches will be disappointed.
As is typical with new technologies, convenience and efficiency are the focus, while security takes the backseat.