Application programming interfaces (APIs) have proven to be a great way for businesses to increase the value of their offerings for customers.
As technology continues to evolve and more and more consumers interact with businesses online via apps, the biggest question is how can businesses keep their employee and customer information safe?
As we marvel once again that the holidays are already upon us, it’s also an opportunity to reflect on 2018, and set a new security strategy that takes into account what we may be up against for the coming year. I sat down recently with our trusted experts and threat intelligence pros, who’ve been right about predicting many trends in cybersecurity
It’s probably fair to say that 2018 has experienced more than its share of data breaches. In fact, according to Gemalto’s Breach Level Index, the first half of the year alone saw 945 data breaches compromise an incredible 4.5 billion data records worldwide.
As another year comes to a close, application security remains more important than ever; it is a must have. With virtually every business using applications to grow their businesses, the vulnerabilities and risks associated with these business-enabling applications continue to grow exponentially.
2018 has been a record year for security breaches – but that’s not news. Inevitably, each year has more security incidents than the previous year, and the pattern is likely to continue for the foreseeable future.
Since it’s Thanksgiving, WhiteHat wondered, what are hackers giving thanks for? The simplest answers are Google, gigabit internet speeds, and an endless supply of caffeine. But the number one thing that hackers are overwhelmingly grateful for is DATA, especially passwords stored in plain or cleartext.
With Black Friday and Cyber Monday quickly approaching, the deals have already begun. 2018 is expected to be yet another year for record-setting sales figures, continuing the growth of the holiday from its induction.
With the proliferation of the mobile workforce in recent years, policies such as “bring your own device” (BYOD) have exploded in popularity - leading to the next stage of the cycle: “bring your own apps” (BYOA).