Business Logic Assessments (BLAs) are manual assessments performed by experienced security experts for application security vulnerabilities that cannot be tested effectively in an automated fashion.
To accept cookies or to not accept cookies, that is the question. Find yourself ignoring that relentless cookie consent banner? We all do it, even security pros.
2020 saw most businesses hastily pivot to digital business models which makes almost every industry more vulnerable to cyberattacks than ever. As we cautiously walk through the hallway of 2021, it’s encouraging to see organizations step-up on a vigilance-based mindset and making cybersecurity a priority for this year.
Digital transformation has morphed from a competitive advantage to a necessity for business survival. As applications are produced faster and faster, hackers are standing by, ready to strike.
November 30th is National Computer Security Day reminding people to take ownership of their online presence and identity.
Women make up 47 percent of the workforce in America yet hold only 26 percent of technology roles.
Veterans Day is an important day set aside to honor and show appreciation for ALL who have served in the United States military—in wartime or peacetime, living or deceased.
During the current pandemic, cybercriminals are specifically targeting healthcare, pharmaceutical, and medical research organizations working on developing a vaccine for the virus.
In Bridge Your Executive Team’s AppSec Anxieties, they review the current security climate, provide real answers to how to navigate the added stress this climate brings to CISOs and security teams, and easy ways to improve your application security posture.
On November 3rd, one of the most critical decisions in this country will be made, a collective decision made by the American people.
In 2019, former MIT Technology Review’s San Francisco Bureau Chief Martin Giles, who covered cybersecurity and the future of computing, was interviewed in a podcast where he offered a realistic, but bleak observation.
Applications are the driving force of this new world economy, however, security teams are frustrated and overwhelmed as they struggle to keep up with the ever-increasing sophistication of attacks on applications.
Most mobile applications fail critical security tests. Quite often, businesses apply their mobile application security processes to their use of web security scanning tools.
The last few months have been unprecedented times for all of us. Individuals, organizations, and customers alike are facing incredible challenges as they grapple with the ever-changing new norms.
As your trusted partner in application security, we are committed to delivering the experience you know and trust in an environment that promotes and protects the well-being of all, across all offices, customers and partners.
Gartner just published its 2020 Magic Quadrant for Application Security Testing (AST), and we’re pleased to be named a Leader! This is the fifth time that WhiteHat has been acknowledged as a Leader in this report.
In application security, so often the cause of vulnerabilities can be traced to the development process. It’s the nature of application development and a consequence of moving faster with shorter deadlines.
In 2018, nearly a quarter of the American workforce was already working remotely. While we’ve had available technology to support remote workers for some time, the COVID-19 outbreak has influenced an unprecedented shift to remote working en masse.
There’s enough evidence to indicate that both nation-state and other cyber threat actors continue to target our election infrastructure. Securing voting systems from cyber intrusions is a huge challenge for the election officials during the 2020 U.S. elections.
The WhiteHat Security team recently returned from the RSA Conference in San Francisco.
International Women’s Day originated as a way to end discrimination against women around the world.
For most Americans, Tax Day (April 15) is a dreaded, recurring deadline (or headache) on the calendar that many will put off and scramble to meet in time.
The WhiteHat Security team has just returned from another successful RSA Conference in San Francisco.
In recent weeks, news broke that Docker registry misconfigurations could have exposed countless organizations to data theft and supply-chain attacks, following a discovery by Palo Alto Networks’ Unit 42 researchers.
On Jan. 8, we learned that a series of vulnerabilities in the popular social media app TikTok left the personal information of its users susceptible to exposure, potentially allowing cybercriminals to manipulate content on user accounts.
With the tensions in Iran escalating over the past few weeks, nation-state cyberattacks have been on the forefront of government agencies’ minds.
Applications are quickly becoming a top target for digital adversaries, as more businesses rely on them to drive their revenue and success.