Window of Exposure Wide Open for Utilities’ Apps

With all the talk about the ongoing menace of ransomware, it’s easy to overlook application-specific attacks. But new research from WhiteHat Security shows that there might just be a greater likelihood of the latter. Most troubling in the latest insta… Continue reading Window of Exposure Wide Open for Utilities’ Apps

Harnessing the Power of Transfer Learning to Detect Code Security Weaknesses

Detecting vulnerabilities in code has been a problem facing the software development community for decades. Undetected weaknesses in production code can become attack entry points if detected and exploited by attackers. Such vulnerabilities can greatly damage the reputation of the company releasing the software and, potentially, the operational and financial well-being of the companies that […]

The post Harnessing the Power of Transfer Learning to Detect Code Security Weaknesses appeared first on Security Intelligence.

Continue reading Harnessing the Power of Transfer Learning to Detect Code Security Weaknesses

Despite COVID-19 pandemic, Imperva reports number of vulnerabilities decreased in 2020

Imperva’s report, The State of Vulnerabilities in 2020 has revealed that unlike in previous years, researchers observed a fall in the number of vulnerabilities last year, even as businesses were compelled to accelerate digital transformation processes … Continue reading Despite COVID-19 pandemic, Imperva reports number of vulnerabilities decreased in 2020

IBM Works With Cisco to Exorcise Ghosts From Webex Meetings

COVID-19 has changed the way many people work, as organizations have shifted to remote work to slow the spread. In early May, more than 100 million Americans were working from home, creating an increased need for remote collaboration tools like video conferencing. The use of Webex grew 451% between Feb. 17 and June 14 2020. […]

The post IBM Works With Cisco to Exorcise Ghosts From Webex Meetings appeared first on Security Intelligence.

Continue reading IBM Works With Cisco to Exorcise Ghosts From Webex Meetings

Updating Legacy Systems Amid Growing Cybersecurity Concerns

Over the past few months, a shift to remote working has raised many security questions for businesses trying to protect their data. And, ensuring that legacy systems are secure is a key priority.  Keeping legacy systems up to date in a world of increasing cyber threats has been a concern the past few years, but […]

The post Updating Legacy Systems Amid Growing Cybersecurity Concerns appeared first on Security Intelligence.

Continue reading Updating Legacy Systems Amid Growing Cybersecurity Concerns

Fix Shadow IT In Your Organization

Shadow IT can be potentially harmful to a company’s security protection, because it exists outside a company’s typical software and service approval and audit workflows. Shadow IT refers to information technology projects, applications and software used and managed outside of—and without the knowledge of—an IT department. Employees unfamiliar with the way software works can easily […]

The post Fix Shadow IT In Your Organization appeared first on Security Intelligence.

Continue reading Fix Shadow IT In Your Organization

AppSec Insights From Think 2019: Four Steps to Optimize Your Application Security Program

Whether you’re a small startup or an international enterprise, a successful application security program involves more than just scanning for vulnerabilities.

The post AppSec Insights From Think 2019: Four Steps to Optimize Your Application Security Program appeared first on Security Intelligence.

Continue reading AppSec Insights From Think 2019: Four Steps to Optimize Your Application Security Program

How to Balance Speed and Security in Your Application Security Program

To compete in today’s software market, developers are under pressure to build quality code quickly. But DevOps processes that fail to account for application security are bound to miss critical flaws.

The post How to Balance Speed and Security in Your Application Security Program appeared first on Security Intelligence.

Continue reading How to Balance Speed and Security in Your Application Security Program

Securing the Microservices Architecture: Decomposing the Monolith Without Compromising Information Security

Ditching monolith for microservices may be right for your organization, but it’s critical to address the relevant security considerations early in the process.

The post Securing the Microservices Architecture: Decomposing the Monolith Without Compromising Information Security appeared first on Security Intelligence.

Continue reading Securing the Microservices Architecture: Decomposing the Monolith Without Compromising Information Security

Application Security Has Nothing to Do With Luck

If a safe, secure product and a satisfied customer base is the pot of gold at the end of your rainbow, it’s time to build application security processes into your development cycle.

The post Application Security Has Nothing to Do With Luck appeared first on Security Intelligence.

Continue reading Application Security Has Nothing to Do With Luck