Back in March at the RSA Conference in San Francisco, WhiteHat announced that NTT Security Corporation, one of the world’s most respected security organizations, signed a definitive agreement to acquire WhiteHat. Throughout the past few months, we’ve been working closely with NTT Security to finalize all of the details of the acquisition...
Recently, I was out on a shopping trip at a department store, and I saw an employee scrambling to help the customers at the fitting room.
WhiteHat Security celebrates the 95th annual International Women in Engineering Day. Donna Estrin, senior director of corporate marketing gains insight from several women engineering experts at WhiteHat on their career experiences.
Rachel Andrews, DAST Security Specialist at WhiteHat Security, reflects on her recent experience at InfoSecurity Europe and growing trends in Cybersecurity.
Speed to market has been everything in the software development world. But over time we’ve discovered that speed alone cannot remain the end all be all. The majority of data breaches have to do with web application security vulnerabilities; and therefore, security must become part of the software development equation.
It’s no secret that the gender gap in technology is still an issue today.
Cross-Site Request Forgery (CSRF) generates many questions from prospects, customers, partners, and Web application security professionals we work with.
Is your organization compliant with the security standards and regulations implemented by your industry, state, or country that are applicable to your organization? If you answered yes, congratulations. Now, a follow-up question. Is your organization actually secure?
For women in cybersecurity looking to take the next step in their career, navigating that pathway can be challenging.
In today’s digital economy, time to market is everything. Organizations are expected to release applications and updates on a near-continuous basis, or risk being left behind by the competition.
As most people know, there are a lot of moving parts that go into running a cybersecurity company.
In the application security space, customers and prospects tell the same story time and time again:
Everyone knows that there are two things that are certain in life: death and taxes.
The popularity of reusable software components has soared throughout the developer community in recent years, largely due to the convenience and time saving opportunities they offer.
For every 100KLOC, a monolithic application will have an average of 39 vulnerabilities, whereas a microservice application will have an average of 180 vulnerabilities.
There’s been much public debate in the tech industry around a growing shortage of qualified tech talent that’s making it difficult for organizations to hire or find workers with the right skills or experience.
Over the past year, data breaches, through web, business, and mobile application exploitation, have continued to run rampant. In 2018, major household names like Ticketmaster, the United States Postal Service (USPS), Air Canada, and British Airways were hit by application-based exploits.
I recently had the opportunity to attend the fourth annual Watermark Women’s Conference held in Silicon Valley, and what an experience it was!
Today, March 8, marks International Women’s Day, a global day tabbed to celebrate women’s achievements throughout history and their social, economic, cultural and political achievements.
Today marks a big step for WhiteHat Security. I am delighted to announce that NTT Security Corporation, one of the world’s most respected security organizations, has signed a definitive agreement to acquire WhiteHat Security.
The RSA Conference (March 4-8, 2019) kicks off today in San Francisco, serving as a timely and important reminder of the criticality of securely building products in an increasingly unsafe digital world.
In 2018, the number of exposed data records through breached applications more than doubled from 197.6 million in 2017 to 446.5 million. And this trajectory will likely continue through 2019.
IT security is a massive concern for many organizations of all shapes and sizes. The consequences of a security failure are often drastic, sometimes terminal. Over recent years, there has been a relentless upward trajectory in spending on IT security, and there are no signs of that trend abating.
Each year, by the time the calendar changes to February, for many, the interest in maintaining the New Year’s resolutions made in early January has started to wane. While increasing work life balance, eating healthier and losing weight frequently make the resolutions list, what about resolutions to help safeguard data?
Staying on top of the evolving threat landscape is a daunting task, to say the least. There is just so much information that researchers must sift through, that it’s easy to become overloaded.
With an expanding client roster, key executive leadership appointments and widespread adoption of its platform, 2018 was a banner year for WhiteHat Security, one that saw more than 35 percent growth and the highest customer retention to date.
Throughout the past couple of years, we have seen massive data breaches affect hundreds of companies across all industries. Due to these incidents, companies have lost millions of dollars in revenue and time as they rush to mitigate damages, inform the public and fix the problem at hand.