To date, SAP has issued over 3,660 Security Notes and Support Package Implementation Notes to address thousands of vulnerabilities in its business critical applications, a new report from ERPScan reveals. [Read More]
Adobe’s Flash Player might be the most targeted product when criminal exploit kits are involved, Microsoft Office, Windows and Internet Explorer take center stage when Russian advanced persistent threat (APT) groups are involved. [Read More]
The Internet of Things (IoT) will result in billions of connected devices coming on line in the next ten years, and the associated software will be built by industries that traditionally have not emphasized software security.
Aside from tools, there are many types of application security testing that can be used to find vulnerabilities in software. An organization must consider multiple software security testing methods to really manage its risk.
For the past several years, enterprise security leaders have been challenged with the task of locking down endpoints with traditional security solutions that are proving to be ineffective against todays threats.