“The customer is always right,” is the go-to customer service phrase originally coined by Harry Gordon Selfridge in London in the early 20th century.
When British Airways was informed it was facing a fine of £183 million by the UK’s Information Security Commissioner (ICO) in July, at the heart of the problem was the company’s failure to protect customer information including their credit card details.
Server-side request forgery (SSRF) has been in the news recently for causing mainstream data breaches impacting hundreds of millions of consumers.
More and more, businesses today are staking their success on web and mobile applications.
Thousands of people every year gather in the desert to be able to attend one of the most captivating events in the world.
In the current data compliance and data security climate, empowered regulators are really flexing their muscles.
Despite women gaining the equal right to vote in 1878 and the U.S. Congress designating Aug. 26 as Women’s Equality Day in 1971, the tech industry still has a long way to go.
As modern application development trends go, distributed microservices architecture has been one of the most popular and successful in recent memory.
This is the 14th year that we are publishing our annual WhiteHat Security Application Security Statistics report. Over the years, this report has become the authoritative take on the state of application security globally.
Data privacy is all about users’ personal data collected, stored or used by an organization, but are organizations doing enough to keep this data protected from unauthorized access?
The WhiteHat Security team is seeing a massive shift towards cloud adoption largely driven by organizations looking to reduce cost, mitigate risk, and to allow them to scale quickly and be agile with their resources.
“The more things change, the more they stay the same.” This simple, succinct proverb created in the 19thcentury by French novelist Jean-Baptiste Alphonse Karr continues to resonate in so many areas of our day-to-day lives.
If the title on your office door says, 'Chief Information Security Officer (CISO),' chances are, your days are consumed with the various risks your organization is facing, and how you’ll deal with them.
In this article, we’ll take a closer look at how research partners Vertical Structure and WhiteHat Security worked together to identify and verify a vulnerability, and then notify and work with the vendor to quickly and effectively remediate the issue and protect customers.
Back in March at the RSA Conference in San Francisco, WhiteHat announced that NTT Security Corporation, one of the world’s most respected security organizations, signed a definitive agreement to acquire WhiteHat. Throughout the past few months, we’ve been working closely with NTT Security to finalize all of the details of the acquisition...
Recently, I was out on a shopping trip at a department store, and I saw an employee scrambling to help the customers at the fitting room.
WhiteHat Security celebrates the 95th annual International Women in Engineering Day. Donna Estrin, senior director of corporate marketing gains insight from several women engineering experts at WhiteHat on their career experiences.
Rachel Andrews, DAST Security Specialist at WhiteHat Security, reflects on her recent experience at InfoSecurity Europe and growing trends in Cybersecurity.
Speed to market has been everything in the software development world. But over time we’ve discovered that speed alone cannot remain the end all be all. The majority of data breaches have to do with web application security vulnerabilities; and therefore, security must become part of the software development equation.
It’s no secret that the gender gap in technology is still an issue today.
Cross-Site Request Forgery (CSRF) generates many questions from prospects, customers, partners, and Web application security professionals we work with.
Is your organization compliant with the security standards and regulations implemented by your industry, state, or country that are applicable to your organization? If you answered yes, congratulations. Now, a follow-up question. Is your organization actually secure?
For women in cybersecurity looking to take the next step in their career, navigating that pathway can be challenging.
In today’s digital economy, time to market is everything. Organizations are expected to release applications and updates on a near-continuous basis, or risk being left behind by the competition.
As most people know, there are a lot of moving parts that go into running a cybersecurity company.
In the application security space, customers and prospects tell the same story time and time again:
Software composition analysis (SCA) allows organizations to identify third-party and open source components that have been integrated into all applications, and for each of these components, it identifies:
Everyone knows that there are two things that are certain in life: death and taxes.
The popularity of reusable software components has soared throughout the developer community in recent years, largely due to the convenience and time saving opportunities they offer.