Video conferencing vendor Zoom has opted to make major changes to its Mac application after a security researcher found several weaknesses in it. The changes come after the researcher refused a bug bounty and instead went public after 90 days, putting pressure on Zoom.
If you analyze any of the recently published cyber attacks, two patterns emerge:
80-90% of the attacks exploit an unpatched vulnerability or an unhardened, widely open system
70% of the attacks begin at the endpoints
While "cool" new products create a lot of buzz, cyber hygiene is often ignored. But, it must be...
Many types of cyberattacks are undetectable by conventional security technologies, which places applications at risk, says Franklyn Jones of Cequence Security, who shares his company's latest research on this topic.
With attackers continuing to hammer weaknesses in software, organizations must prioritize application security more than ever, says Ian Ashworth of Synopsys. Thankfully, developers and middle management - bolstered by agile methodologies and DevOps - are increasingly leading the charge.
Hackers appear to have accessed a new mobile payment app for 7-Eleven customers in Japan, taking about $500,000 from 900 customers over several days. Poor passwords and authentication designs by the company are likely to blame, according to media reports.
Want to keep up with your dynamic environment with unified insights? Splunk for container monitoring provides a solution to help ensure your containers are available, and issues are fixed quickly with minimal effort. Now your developers can focus on what's most important - the application itself.
Join this webinar...
Did you know that public exploits for business applications have increased 100 percent since 2015?Today, over 77 percent of the world's transactional revenue touches an ERP system, making these applications an attractive target for cyber criminals looking to profit from the highly-sensitive and regulated data that...
Containerization introduces new processes that move code through the software development pipeline at an accelerated pace and with greater flexibility (or, less oversight).
This eBook explains how DevSecOps can deliver context-aware security while automating the entire image-to-production process, allowing...
A critical part of any security infrastructure is providing the capacity to secure containerized applications across any platform, orchestrator, or cloud.
This Container Security Guide provides visual, easy-to-digest diagrams that show how to:
Ensure images are free from known vulnerabilities, secrets and...
Visibility, or a lack thereof, continues to challenge organizations as they attempt to protect their businesses by knowing which systems, applications and data they have, says AlgoSec's Jeffrey Starr. He discusses how centralized visibility, control and automation can help.
As organizations pursue digital transformation initiatives backed by new application deployment techniques, they must ensure that security, operations and development teams fully coordinate, says Marco Rottigni of Qualys.