When British Airways was informed it was facing a fine of £183 million by the UK’s Information Security Commissioner (ICO) in July, at the heart of the problem was the company’s failure to protect customer information including their credit card details.
In the current data compliance and data security climate, empowered regulators are really flexing their muscles.
IT security is a massive concern for many organizations of all shapes and sizes. The consequences of a security failure are often drastic, sometimes terminal. Over recent years, there has been a relentless upward trajectory in spending on IT security, and there are no signs of that trend abating.
As cybercriminals’ methods become increasingly more advanced and sophisticated, no business or device is safe from an attack, with repercussions that could damage reputations, data and bottom lines.
As more and more organizations are embracing agile, fast waterfall, DevOps methodologies, a key cultural shift is happening towards bringing security closer to developers.
Learn about Facebook, APIs, and Application Data Mining from the product marketing team a WhiteHat Security.
The building blocks essential to digital transformation for a safe digital life entail securing APIs and Microservices - learn more from Craig Hinkley, CEO of WhiteHat Security.
That was a great show. But I’m not sure it really taught us anything. Because in today’s scary cyber security climate, it turns out that all of us – the humans – are “the weakest link.”
Software Composition Analysis (SCA) allows you to identify third-party and open source components that have been integrated into all your applications.