It’s that time of year again: the holidays are among us. Soon, millions of us will be on the road and in the air, on our way to visit friends and relatives to celebrate the season (or perhaps to get away from it all).
Each November, National Stress Awareness Day is recognized on the first Wednesday of the month and aims to identify and reduce the stress factors in your life.
When British Airways was informed it was facing a fine of £183 million by the UK’s Information Security Commissioner (ICO) in July, at the heart of the problem was the company’s failure to protect customer information including their credit card details.
In the current data compliance and data security climate, empowered regulators are really flexing their muscles.
IT security is a massive concern for many organizations of all shapes and sizes. The consequences of a security failure are often drastic, sometimes terminal. Over recent years, there has been a relentless upward trajectory in spending on IT security, and there are no signs of that trend abating.
As cybercriminals’ methods become increasingly more advanced and sophisticated, no business or device is safe from an attack, with repercussions that could damage reputations, data and bottom lines.
As more and more organizations are embracing agile, fast waterfall, DevOps methodologies, a key cultural shift is happening towards bringing security closer to developers.
Learn about Facebook, APIs, and Application Data Mining from the product marketing team a WhiteHat Security.
The building blocks essential to digital transformation for a safe digital life entail securing APIs and Microservices - learn more from Craig Hinkley, CEO of WhiteHat Security.
That was a great show. But I’m not sure it really taught us anything. Because in today’s scary cyber security climate, it turns out that all of us – the humans – are “the weakest link.”
Software Composition Analysis (SCA) allows you to identify third-party and open source components that have been integrated into all your applications.
2018 is right around the corner, and with the changing of the calendar people naturally gravitate to looking ahead and thinking about everything that will happen in 2018. Security is no different and we often are asked, what’s going to happen in 2018?
The security industry needs unbiased sources of information who share best practices with an active membership body who advocates for open standards. In the AppSec world, one of the best is the Open Web Application Security Project (or OWASP).
WhiteHat Security gathered data from our own security report, as well as numerous other sources about developers and application security, and we found some interesting patterns.
2017 has been a wild ride in the security world. This year we saw several high-profile breaches and cyber-attacks, the most notable being the Equifax breach and the WannaCry malware campaign.
The news was just released that a massive breach hit Uber in October of 2016. The personal information of 57 million Uber users and 7 million Uber drivers were stolen, including names, email addresses and phone numbers.
Black Friday and Cyber Monday are less than a week away and the sales have already begun. As people are hunting for the best deal on that new TV, they often forget about security entirely. So what should we all be worried about when buying items this holiday season and what can we do to stay safe?
Using "HREF with Target" can have exploits and weaknesses - learn best practices from secure coding experts on preventive measures.
Week four of National Cyber Security Awareness Month is focused around a career in cyber security.
Week three of National Cyber Security Awareness Month is focused around connected devices.
Learn best practices about how to avoid API Vulnerabilities from security experts at WhiteHat Security.
I’ve written about the recent Equifax, Sonic and Whole Foods breaches already, but am following up here to challenge anyone reading this: HAVE YOU TAKEN ACTION TO PROTECT YOURSELF YET?
We have learned today that the Equifax breach that has affected hundreds of millions of people was exploited by utilizing a known issue in Apache Struts 2, specifically CVE-2017-5638.
The news broke yesterday that Equifax had a massive breach that leaked personal information including Social Security Numbers, names and Drivers License numbers. The scope of this breach is staggering: 143 million records.
Every time someone comes to me for career advice, or asks where I think they should look for their next big opportunity, I say – “Consider a career in cybersecurity.” It is a huge field with a broad spectrum of job opportunities.
In this article, I’m going to help you interpret how the different parts of this cybersecurity regulation touch on AppSec – that is, your websites, your mobile applications, your internal payment systems and networked third-party services.
The CopyCat malware exploits some known vulnerabilities in older versions of Android which allows an attacker to root the victim’s phone. It then can install applications and will hijack ads from your phone, effectively paying the attacker each time an ad pops up.
Applications are literally at the core of our digital lives, so it’s more important than ever to ensure that enterprises of all types can provide safe digital experiences. We hope this report provides valuable insights and recommendations on how to secure the apps that drive your business.