October is known for being the “spookiest” of all the months. While there’s always debate on if ghosts, ghouls and witches are real, no one can argue the existence of scary vulnerabilities lurking in the dim corners of the web and on applications.
Artificial intelligence (AI) is a bit of a buzzword, and it has been thrown around quite a bit in the past few years. But many companies are making real game-changing use of it.
The modern-day developer faces an inordinate amount of challenges daily. Between constantly fighting to create the most innovative apps to help their product stand out to working to meet tight deadlines, developers juggle many responsibilities.
October marks the 16th annual National Cyber Security Awareness Month (NCSAM).
A collaborative effort between government and industry, National Cybersecurity Awareness Month (NCSAM) is observed every October in an effort to raise awareness about the importance of cybersecurity and to ensure that all Americans have the resources they need to stay safer and more secure online.
Previously, we discussed in part 1 of this blog series, application security issues are becoming the first and foremost cause of security breaches, leading to some real challenges among organizations attempting to achieve DevSecOps.
Whether it was the millions of users left vulnerable by Fortnite, or hackers gaining access to Dunkin’ customer accounts, 2019 has already seen some of the worst data breaches to date.
Recently, there has been a constant upward trajectory in spending on IT security, and there are no signs of that trend abating.
If businesses hadn’t already woken up to the financial clout that’s now in the hands of the world’s data protection regulators, the recent compliance fines in the US and UK have made everyone sit up and take notice.
“The customer is always right,” is the go-to customer service phrase originally coined by Harry Gordon Selfridge in London in the early 20th century.
When British Airways was informed it was facing a fine of £183 million by the UK’s Information Security Commissioner (ICO) in July, at the heart of the problem was the company’s failure to protect customer information including their credit card details.
Server-side request forgery (SSRF) has been in the news recently for causing mainstream data breaches impacting hundreds of millions of consumers.
More and more, businesses today are staking their success on web and mobile applications.
Thousands of people every year gather in the desert to be able to attend one of the most captivating events in the world.
In the current data compliance and data security climate, empowered regulators are really flexing their muscles.
Despite women gaining the equal right to vote in 1878 and the U.S. Congress designating Aug. 26 as Women’s Equality Day in 1971, the tech industry still has a long way to go.
As modern application development trends go, distributed microservices architecture has been one of the most popular and successful in recent memory.
This is the 14th year that we are publishing our annual WhiteHat Security Application Security Statistics report. Over the years, this report has become the authoritative take on the state of application security globally.
Data privacy is all about users’ personal data collected, stored or used by an organization, but are organizations doing enough to keep this data protected from unauthorized access?
The WhiteHat Security team is seeing a massive shift towards cloud adoption largely driven by organizations looking to reduce cost, mitigate risk, and to allow them to scale quickly and be agile with their resources.
“The more things change, the more they stay the same.” This simple, succinct proverb created in the 19thcentury by French novelist Jean-Baptiste Alphonse Karr continues to resonate in so many areas of our day-to-day lives.
If the title on your office door says, 'Chief Information Security Officer (CISO),' chances are, your days are consumed with the various risks your organization is facing, and how you’ll deal with them.
In this article, we’ll take a closer look at how research partners Vertical Structure and WhiteHat Security worked together to identify and verify a vulnerability, and then notify and work with the vendor to quickly and effectively remediate the issue and protect customers.
Back in March at the RSA Conference in San Francisco, WhiteHat announced that NTT Security Corporation, one of the world’s most respected security organizations, signed a definitive agreement to acquire WhiteHat. Throughout the past few months, we’ve been working closely with NTT Security to finalize all of the details of the acquisition...
Recently, I was out on a shopping trip at a department store, and I saw an employee scrambling to help the customers at the fitting room.
WhiteHat Security celebrates the 95th annual International Women in Engineering Day. Donna Estrin, senior director of corporate marketing gains insight from several women engineering experts at WhiteHat on their career experiences.
Rachel Andrews, DAST Security Specialist at WhiteHat Security, reflects on her recent experience at InfoSecurity Europe and growing trends in Cybersecurity.
Speed to market has been everything in the software development world. But over time we’ve discovered that speed alone cannot remain the end all be all. The majority of data breaches have to do with web application security vulnerabilities; and therefore, security must become part of the software development equation.
It’s no secret that the gender gap in technology is still an issue today.