Passwords a Threat to Public Infrastructure

With this year’s World Password Day upon us, it’s high time to take a good look at the critical infrastructure sector and the password-related security vulnerabilities that are in dire need of an update. While modern utility systems become increasingl… Continue reading Passwords a Threat to Public Infrastructure

Verification of certificate trustworthiness (e.g. in JWS and Client Certificate)

I am comparing implementation complexity of JWS and Client Certificate and troubleshooting Client Certificate at the same time.
I understand that both methods require to prove that the certificate (x5c in JWS or the actual Client Certifica… Continue reading Verification of certificate trustworthiness (e.g. in JWS and Client Certificate)

Experian API Leaked Credit Scores

After Experian fixed a weakness at a partner website that let anyone view credit scores for nearly every American by just inputting a name and address, questions remain about whether the same problem exists with other partners, and how widespread the … Continue reading Experian API Leaked Credit Scores

Research Shows Glaring Mobile App Security Issues

The COVID-19 pandemic has driven the world online in remarkable ways, forever changing the way we work, learn, and interact. The increased reliance on mobile applications is starkly apparent; mobile app usage grew 40% year-over-year in the second quar… Continue reading Research Shows Glaring Mobile App Security Issues

ZeroNorth’s DevSecOps Platform Makes Another Journey Around the Sun!

Happy second birthday to ZeroNorth! Today marks two years of our ongoing dedication to helping organizations build and…
The post ZeroNorth’s DevSecOps Platform Makes Another Journey Around the Sun! appeared first on ZeroNorth.
The post ZeroNorth’s DevS… Continue reading ZeroNorth’s DevSecOps Platform Makes Another Journey Around the Sun!

Contextual Biometrics for Improved Application Security

Securing mobile devices and mobile applications is a nuisance. Security best practices dictate having authentication methods to log in and open the device, and that users should log off every app after each use. Best practices, however, are inconvenie… Continue reading Contextual Biometrics for Improved Application Security

LinkedIn Attacks Show Dangers of Professional Networking

Leveraging the human factor via social media to launch cyberattacks is a tried-and-true method, and one that will be with us for many more years to come. The recent LinkedIn attacks, where malicious actors used fake profiles linked to hostile states t… Continue reading LinkedIn Attacks Show Dangers of Professional Networking

Best Practices for Securing Modern Applications

As the COVID-19 pandemic took over the world, more and more businesses rushed to the cloud without taking into consideration the security issues that could result from rapid deployment. There is no doubt that moving to the cloud has a wealth of benefi… Continue reading Best Practices for Securing Modern Applications