How Apple's new App Store privacy requirements may affect users and app developers
The SolarWinds Perfect Storm: Default Password, Access Sales and More
Both organizations and consumers are evolving, becoming more digital, and requiring features that align with the current environment.
Craig Hinkley -- Vision Mixed with Humility
'Vishing’ attack on GoDaddy employees gave fraudsters access to cryptocurrency service domains NiceHash, Liquid.
The global cybersecurity workforce has increased by 700,000 to 3.5 million (while the shortfall has decreased by 950,000 to 3.12 million);
Unit 42 researchers discovered a class of Amazon Web Services (AWS) APIs that can be abused to leak the AWS Identity and Access Management (IAM) users and roles in arbitrary accounts.
Three major APTs are involved in ongoing compromises at pharma and clinical organizations involved in COVID-19 research, Microsoft says.
Cyber-researchers weigh in on what concerns them the most as the U.S. heads into the final weekend before the presidential election — and they also highlight the positives.
Measures to improve voting security need to start long before election day itself
Data privacy is one of the hottest conversation topics spanning all industries and regions – for good reason.
As we move into the second half of 2020 and the California Consumer Privacy Act (CCPA) is officially enforced, we are also in the midst of a global crisis that was not properly on the radar when the regulation was enacted in January.
The tech giant said this week that the next version of the Chrome browser, coming in October, will
IBM will pony up $1 million worth of technology to the city of Los Angeles for COVID-19 contact tracing, and The Weather Channel app will change its privacy practices regarding use of user location data.
Fans of TikTok continued to enjoy quirky videos as the Trump administration apparently backed away from its threat to ban the popular Chinese-owned social media platform and warmed to the idea of a U.S. company taking control.
WhiteHat Security, Chief Strategy Officer, Joseph Feiman has been in the business for many years now, and he agreed to speak to us about several topics, including the changes COVID-19 has brought upon us and our work routines.
Just under half of businesses have experienced at least one “business impacting cyber-attack” related to COVID-19 as of April 2020.
Twitter said that the problems related to an Android security issue in OS 8 and 9. According to Twitter, around 96 percent of people using Twitter for Android already have a security patch for this vulnerability. The company added that it has not found any evidence that this security flaw was exploited, but it can’t be completely sure.
A high percentage of discovered bugs remain unremediated for a long time, a new study shows.
Telehealth, once considered a luxury that only around half of hospitals offered, has accelerated during the COVID-19 pandemic. It’s become an invaluable tool for a population living with social distancing, giving patients the opportunity to seek medical consultations using today’s digital technologies.
In this column, we present a variety of short time-critical news items grouped by category such as people movements, funding news, financial results, industry alignments, rumors and general scuttlebutt floating around the big data, data science and machine learning industries including behind-the-scenes anecdotes and curious buzz.
Security firm Fidus has revealed how OnePlus' lack of PCI compliance and the company's practice of hosting payment card details on-site is compromising credit card details of customers.
Organizations that want to integrate security into their DevOps pipelines should adopt tools and practices that unite application development, IT operations, and security teams under a common DevSecOps rubric.
Every company developing software, whether for commercial or internal use, should be investing in software security. But before you can begin selecting application security products, you have to first understand the types of application security you require.
The practice of application security (app sec) involves all the measures that organizations take to prevent, detect, and fix vulnerabilities in the software used to run their business.
The internet of things (IoT) is opening a whole new world of possibilities. Unfortunately, it also is creating a whole new world of threats too, such as ransomware of things (RoT). Here are seven things enterprises can do to better secure their IoT.
Variations of so-called email access scams have become a $5.3 billion problem affecting businesses and consumers in all sectors, the FBI warned in a May public service announcement.
On September 8, 2017, Equifax revealed that they suffered a massive data breach, with approximately 143 million records compromised, including social security numbers, first and last names, birth dates, addresses, and more in some cases.
Changes include a new discounting and margin system, more flexible contracts, and a much improved deal registration process that is now within the WhiteHat partner portal.
WhiteHat Security on Wednesday unveiled its new Partner Network program that offers predictable margins, and is built around its application security platform with services that span the entire software development life cycle.
On Wednesday, a data breach at drive-in food chain Sonic jeopardized the security of credit cards from up to 5 million customers, whose accounts are being “peddled in shadowy underground cybercrime stores,” website Krebs on Security informed.
Low-code software development platforms are proliferating rapidly, even as headline-grabbing security breaches continue. Here's how they can help make software safer.