So now that I’ve established myself as a lover of FB and social media, may I ask that you all please carefully consider which additional new and (worse) seldom-used applications that you grant permission to “Log On with Facebook?” (Or Google+, or Twitter – I’m not just targeting any one federated login mechanism.)
But then we got mobile devices, and executives fell in love with tablets. And then smart objects, from buildings to cars and medical devices. The boundaries of the network keep growing, but we security experts keep saying that the user is the weakest link.
With the migration towards digital transformation and the onslaught of cyber attacks, we need a “Security Facts” label so that we as consumers may make more informed decisions about the risk we are inheriting from the use or acquisition of applications.
WhitHat Security is pleased to kick off the WhiteHat Certified Secure Developer (WCSD) Program. It is open to all developers free of charge and gives developers that essential jumpstart into understanding app security at a deep technical level.
In summary, 2017 will bring its own share of challenges to security teams.
The WhiteHat team has gathered some thoughts on predictions and new vulnerabilities or trends that might emerge in 2017.
This article provides an executive summary on the Blockchain technology, what it is, how it works, and why everyone is excited about it.
An open letter to the Healthcare Industry Cybersecurity Task Force.
The term “API economy” has become part of the business vernacular because APIs have proven to be a great way for businesses to increase their value by making their core functionality available to more people.
With election season drawing to a close, the topic of internet security – now mentioned in numerous debates/campaigns on both sides – needs to stay a focus of attention. From standards and governance to education and future staffing, here is a plea to keep campaign promises for cyber security attention on the next President’s agenda.