Finalists: Security Innovator of the Year
Innovation builds upon the best of what a sector offers today to create solutions that will transform the way businesses operate tomorrow.
POST AUTHOR
Innovation builds upon the best of what a sector offers today to create solutions that will transform the way businesses operate tomorrow.
The world is inundated with sensitive data. As individuals and businesses alike are increasingly reliant on new data-driven services and products, almost every aspect of our daily activities has become a data collection opportunity.
The fundamentals of a formal, effective application security plan should start with business objectives, tools, processes, and most of all, data, with the primary driver for securing applications focused on protecting data.
Web-facing applications continue to be one of the highest security risks present for organizations, with more than 40 percent of them actively leaking data in a way that can have a ripple affect across businesses and their partners, research has found.
The security breach of security camera startup Verkada, which gave hackers access to videos from nearly 150,000 cameras – including those in prisons, schools, hospitals and electric car giant Tesla -means organizations deploying cloud-based IoT devices should give their security plans another look.
WhiteHat Security, application security provider, released AppSec Stats Flash Volume 3, the latest installment of the company’s monthly report and podcast reflecting on the current state of application security and the wider cyber threat landscape.
At WhiteHat, I have been responsible for establishing and leading WhiteHat’s corporate strategy & development function during critical growth years, resulting in successful exit to NTT Security.
More than 40% of applications are actively leaking information and are at risk of exposing sensitive data, according to new data from WhiteHat Security. Apps in the manufacturing sector are particularly vulnerable.
We learned in 2020 that businesses that were ready to innovate, shift strategy on a dime and try new directions were able to overcome many of the obstacles from the pandemic and adapt to rapid changes.
Facing stiff competition from Disney+, Hulu and HBO Max, the company is looking at ways to keep your account limited to your home only.
The 2020 Internet Crime Report includes information from 791,790 complaints of suspected internet crime.
The Federal Bureau of Investigation said it received more than 241,000 complaints about phishing attempts during 2020.
Verkada breach exposed live feeds of 150,000 surveillance cameras inside schools, hospitals and more
It’s International Women’s Day today and we are celebrating the event by promoting the top voices in the IT and Cloud Security industry via insights, interviews, and featured articles.
According to the Women in Cybersecurity Report by ISC, women working in cybersecurity currently account for about one-quarter (24%) of the overall workforce.
The National Security Agency (NSA) and Cybersecurity and Infrastructure Agency (CISA) released a joint information sheet Thursday that offers guidance on the benefits of using a Protective Domain Name System (PDNS).
The theme of IWD 2021 is apt: "A challenged world is an alert world, and from challenge comes change, so let's all choose to challenge."
In 2019, Satya Nadella, the CEO of Microsoft, delivered a now-famous quote: "Every company is a software company."
Google Alerts used to launch fake Adobe Flash Player updater
WhiteHat Security, the provider of application security, released AppSec Stats Flash Volume 2.
By the summer of 2021, the Greek police will receive thousands of devices allowing for live facial recognition and fingerprint identification.
Focus on the customer. Before moving into any new market, understand how your ideal customer profile is impacted.
With the myriad of SalesTech tools available in today's business environment, it's no surprise that many sales leaders and sales teams are inundated with more data than what they know what to do with.
Digital transformation initiatives have become a common way for companies to make their businesses more agile and to adapt quickly to market changes.
The leading maker of iPhones and other popular mobile platforms that run on iOS said the vulnerabilities were reported by an anonymous researcher.