Network-connected Internet of Things (IoT) are growing in popularity in homes and businesses, from smart cities and buildings to cars and medical devices. Attempts to subvert or compromise critical functions in organizations due to insecure IoT devices and applications are on the rise and in the news.
In the first webinar Introduction to Application Security for Developers, WhiteHat geared towards training and certifying developers to be secure coders.
What follows is a directory traversal hack I found “In the Wild” as they say, on a customer’s actual website I was working on. Our customer was a large enterprise client involved in Information Management, but this could be present on many web applications that allow a user to upload and download files.
There’s a routine to every large company with a DevOps team; from Christmas to New Year’s, there’s going to be a production freeze. Everyone rushes project schedules through November into early December.
This article provides an executive summary on the Blockchain technology, what it is, how it works, and why everyone is excited about it.
Digital transformation introduces many challenges which will differ depending on how mature or advanced your transformation program is, or how easily your organisation adopts or embraces change. However, there are many opportunities which this process can open up for an organisation.
WhiteHat Security announces the release of the eleventh annual Web Applications Security Statistics Report. This report takes a look at stats by industry, application security vulnerabilities, remediation and time-to fix by vulnerability class and risk rating.
After a lot of coordination, research, voting by the community and judging - learn the Top 10 Web Hacking Techniques of 2015.