Women in Cybersecurity and the Skills you Need to Create your Career
According to the Women in Cybersecurity Report by ISC, women working in cybersecurity currently account for about one-quarter (24%) of the overall workforce.
BUSINESS LOGIC ASSESSMENTS: Finding Application Logic Vulnerabilities that an Automatic Scanner can Miss
Business Logic Assessments (BLAs) are manual assessments performed by experienced security experts for application security vulnerabilities that cannot be tested effectively in an automated fashion.
Follow the Cookie Crumbs: The Privacy Concerns Behind Data Tracking
To accept cookies or to not accept cookies, that is the question. Find yourself ignoring that relentless cookie consent banner? We all do it, even security pros.
Building Cyber-Resilience through Application Security for a World’s Largest Fast Food Chain
2020 saw most businesses hastily pivot to digital business models which makes almost every industry more vulnerable to cyberattacks than ever. As we cautiously walk through the hallway of 2021, it’s encouraging to see organizations step-up on a vigilance-based mindset and making cybersecurity a priority for this year.
Calling on Application Security Professional Services
Digital transformation has morphed from a competitive advantage to a necessity for business survival. As applications are produced faster and faster, hackers are standing by, ready to strike.
National Computer Security Day: 3 Steps Towards Staying Safe Online
November 30th is National Computer Security Day reminding people to take ownership of their online presence and identity.
Cultivating Growth for Women in Cybersecurity
Women make up 47 percent of the workforce in America yet hold only 26 percent of technology roles.
A Salute to Our Veterans
Veterans Day is an important day set aside to honor and show appreciation for ALL who have served in the United States military—in wartime or peacetime, living or deceased.
Cybercriminals Target the Pharmaceutical Industry
How to Proactively Increase Cyber Resilience with Application Security
During the current pandemic, cybercriminals are specifically targeting healthcare, pharmaceutical, and medical research organizations working on developing a vaccine for the virus.
Drive the Future Webinar Highlights Bridge Your Executive Team’s AppSec Anxieties
In Bridge Your Executive Team’s AppSec Anxieties, they review the current security climate, provide real answers to how to navigate the added stress this climate brings to CISOs and security teams, and easy ways to improve your application security posture.
Supporting US Employees’ Right to Vote
On November 3rd, one of the most critical decisions in this country will be made, a collective decision made by the American people.
How to Measure and Reduce Cybersecurity Risk in Your Organization
In 2019, former MIT Technology Review’s San Francisco Bureau Chief Martin Giles, who covered cybersecurity and the future of computing, was interviewed in a podcast where he offered a realistic, but bleak observation.
Security in the Fast Lane – Building a Stronger DevSecOps Culture
Applications are the driving force of this new world economy, however, security teams are frustrated and overwhelmed as they struggle to keep up with the ever-increasing sophistication of attacks on applications.
Applications are on the move; how do you secure them?
Most mobile applications fail critical security tests. Quite often, businesses apply their mobile application security processes to their use of web security scanning tools.
Winning Together: Now is the Time to Build Lasting Customer Relationships
The last few months have been unprecedented times for all of us. Individuals, organizations, and customers alike are facing incredible challenges as they grapple with the ever-changing new norms.
An Update to WhiteHat’s Valued Customers and Partners
As your trusted partner in application security, we are committed to delivering the experience you know and trust in an environment that promotes and protects the well-being of all, across all offices, customers and partners.
Gartner Named WhiteHat Security a Leader in its 2020 Magic Quadrant for Application Security Testing
Gartner just published its 2020 Magic Quadrant for Application Security Testing (AST), and we’re pleased to be named a Leader! This is the fifth time that WhiteHat has been acknowledged as a Leader in this report.
Top 10 Application Vulnerabilities of 2019
In application security, so often the cause of vulnerabilities can be traced to the development process. It’s the nature of application development and a consequence of moving faster with shorter deadlines.
Key Considerations for CEOs When Navigating a Crisis
In 2018, nearly a quarter of the American workforce was already working remotely. While we’ve had available technology to support remote workers for some time, the COVID-19 outbreak has influenced an unprecedented shift to remote working en masse.
2020 Election Security: The Urgent Need to Address Vulnerabilities in Voting Systems
There’s enough evidence to indicate that both nation-state and other cyber threat actors continue to target our election infrastructure. Securing voting systems from cyber intrusions is a huge challenge for the election officials during the 2020 U.S. elections.
Cybersecurity Will Always Need the Human Element
The WhiteHat Security team recently returned from the RSA Conference in San Francisco.
Women of WhiteHat Commemorate International Women’s Day
International Women’s Day originated as a way to end discrimination against women around the world.
WhiteHat Security Issues Tax Season Security Advisory: Top Risks and Tips for Avoiding Them
For most Americans, Tax Day (April 15) is a dreaded, recurring deadline (or headache) on the calendar that many will put off and scramble to meet in time.
RSA 2020 Recap: Small Vendors Preview this Year’s Cybersecurity Trends
The WhiteHat Security team has just returned from another successful RSA Conference in San Francisco.
Exposed Docker Registries Serve as Critical Reminder on Container Security
In recent weeks, news broke that Docker registry misconfigurations could have exposed countless organizations to data theft and supply-chain attacks, following a discovery by Palo Alto Networks’ Unit 42 researchers.
Vulnerabilities to popular TikTok app leaves sensitive user data exposed
On Jan. 8, we learned that a series of vulnerabilities in the popular social media app TikTok left the personal information of its users susceptible to exposure, potentially allowing cybercriminals to manipulate content on user accounts.