Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Google releases source code of PathAuditor, a tool designed to help developers identify vulnerabilities related to file access. [Read More]
Cisco Talos releases Mussels, an open source dependency build automation tool. [Read More]
Google says 80% of Android apps encrypt traffic by default and the percentage is even higher in the case of applications designed for the latest versions of the operating system. [Read More]
Google this week announced a partnership with several security solutions providers, aimed at fighting bad applications in the Android ecosystem. [Read More]
Arizona transportation officials announced enhanced security measures after thieves were able to order driver's licenses on ServiceArizona.com using little personal information and have them sent to another address. [Read More]
Apple will soon patch a bug in iOS 13 and iPadOS that gives “full access” permissions to third-party keyboard apps without the user’s approval. [Read More]
A threat actor referred to as POISON CARP has targeted senior members of Tibetan groups via WhatsApp for around six months. [Read More]
Cycode, a company that specializes in protecting source code, has emerged from stealth mode with $4.6 million in seed funding. [Read More]
Windows 7 and Windows Server 2008 will officially reach end-of-support on January 14, 2020, but they will continue to receive security patches past that date, unofficially. [Read More]
Cisco Talos has released two new open source tools for IDA Pro: GhIDA, an IDA Pro plugin, and Ghidraaas (Ghidra as a Service), a docker container. [Read More]

FEATURES, INSIGHTS // Application Security

rss icon

Ashley Arbuckle's picture
As organizations digitize their business and make these shifts, they need to know what and who they can trust.
Laurence Pitt's picture
By paying just a bit more attention to the permissions you are allowing on your phone or computer, you could protect yourself from a much more significant headache down the road.
Travis Greene's picture
While GDPR doesn’t require encryption, there are four mentions of encryption in GDPR that provide real incentives for organizations to use encryption.
Alastair Paterson's picture
A confluence of factors is putting hundreds of thousands of implementations of Enterprise Resource Planning (ERP) applications at risk of cyber attacks.
Jim Ivers's picture
Applications contain three specific components where vulnerabilities can be found, and each must be tested in a different way for security testing to be complete.
Dan Cornell's picture
As you start to get an idea of what your application portfolio looks like, you then need to start determining the specific risks that applications can expose your organization to.
Alan Cohen's picture
From a security perspective, to create understand application dependencies you need not only to understand the flows and servers, you need to understand the ports and underlying processes.
Preston Hogue's picture
Today an organization may have thousands of apps on the internet, but having thousands of monolithic security devices just isn’t practical.
Dan Cornell's picture
Security cannot exist in a vacuum – it must be integrated with the entirety of an organization’s strategy when it comes to securing development operations.
Travis Greene's picture
Shadow IT 2.0 is a symptom of a bigger problem – the inability to maintain digital competitive advantage due to the insufficient pace of code deployment.