Wormable Apple iCloud Bug Allows Automatic Photo Theft

Ethical hackers so far have earned nearly $300K in payouts from the Apple bug-bounty program for discovering 55 bugs, 11 of them critical, during a three-month hack. Continue reading Wormable Apple iCloud Bug Allows Automatic Photo Theft

APIs: Securing the Stitching Connecting Applications

 Application programming interfaces (APIs) are an essential enabler of innovation in today’s digitally driven world. Applications (or application components) can leverage APIs to connect to other apps and communicate autonomously. APIs are found in us… Continue reading APIs: Securing the Stitching Connecting Applications

Mitigating Containers Risk Requires a Comprehensive Approach

Containers have become a staple among large banks and financial services firms, which have used the technology in production. It has captured the attention of the broader market, that hopes to achieve the same technology benefits of improved application delivery and run-time efficiencies. This modular plug-and-play architecture is more scalable and can deliver more power […]

The post Mitigating Containers Risk Requires a Comprehensive Approach appeared first on Security Intelligence.

Continue reading Mitigating Containers Risk Requires a Comprehensive Approach

Why CISOs Should Own Application Rationalization

Reducing overlap and mitigating potential security gaps are just two reasons why application rationalization is a sound strategy A major cybersecurity concern many organizations and executives may not be aware of but will become more prevalent in year… Continue reading Why CISOs Should Own Application Rationalization

Is Security for Containers and Microservices the Same?

From an information security point of view, protecting containerized applications or microservices can be interpreted in two ways.
The post Is Security for Containers and Microservices the Same? appeared first on Radware Blog.
The post Is Security fo… Continue reading Is Security for Containers and Microservices the Same?

Cloud Native – Application Security Weekly #68

    Mike Shema, John Kinsella, and Matt Alderman talk cloud native from an application perspective. Full Show Notes Follow us on Twitter: https://www.twitter.com/securityweekly Hosts Announcements Register for our upcoming webcasts with Viavi & ISC… Continue reading Cloud Native – Application Security Weekly #68

Security Training for Devs – Application Security Weekly #67

    Mike Shema, John Kinsella, & Matt Alderman discuss security training for Devs! Full Show Notes Follow us on Twitter: https://www.twitter.com/securityweekly Hosts Announcements Register for our upcoming webcasts with Viavi & ISC2 by going to… Continue reading Security Training for Devs – Application Security Weekly #67

Shannon Lietz, Intuit – Application Security Weekly #65

    Mike Shema and John Kinsella interview Shannon Lietz, the Director Information Security at Intuit about DevOps. Full Show Notes Follow us on Twitter: https://www.twitter.com/securityweekly Hosts             Announcements Register for our upcoming w… Continue reading Shannon Lietz, Intuit – Application Security Weekly #65

Bugs, Breaches, and More! – Application Security Weekly #65

    There’s no escape that will save you…, the privilege of running a Chrome extension, and Four practices towards DevSecOps! News Bugs, Breaches, and More! There’s no escape that will save you… The privilege of running a Chrome… Continue reading Bugs, Breaches, and More! – Application Security Weekly #65