The building blocks essential to digital transformation for a safe digital life entail securing APIs and Microservices - learn more from Craig Hinkley, CEO of WhiteHat Security.
In 2017, we made a concerted effort to provide more helpful resources to the application security space, and we’re thrilled that these assets were of value to so many people and organizations, across a multitude of industries.
2018 Winter Olympic Games hit with destroyer malware during opening ceremony.
That was a great show. But I’m not sure it really taught us anything. Because in today’s scary cyber security climate, it turns out that all of us – the humans – are “the weakest link.”
Software Composition Analysis (SCA) allows you to identify third-party and open source components that have been integrated into all your applications.
I’d like everyone to pause, and in their minds and hearts say thank you to the hundreds of engineers at various hardware, software, and security vendors who spent their holidays working on OS patches, browser patches, cloud roll-outs and distribution of patches for Meltdown and Spectre.
Well, I called it at the end of 2016. 2017 was a slurry of accusations as well as actual proof found of Russian meddling in U.S. politics via both state infrastructure systems and with regards to online propaganda on social media.
Dust off your Old Glory Insurance policy, ROBOT attack is now a real thing that can happen to you.
2018 is right around the corner, and with the changing of the calendar people naturally gravitate to looking ahead and thinking about everything that will happen in 2018. Security is no different and we often are asked, what’s going to happen in 2018?