Most mobile finance apps vulnerable to data breaches

77% of financial apps have at least one serious vulnerability that could lead to a data breach, an Intertrust report reveals. This report comes at a time where finance mobile app usage has rapidly accelerated, with the number of user sessions in financ… Continue reading Most mobile finance apps vulnerable to data breaches

A leadership guide for mitigating security risks with low code platforms

The low code market continues to grow, increasingly finding adoption for more diverse and serious applications among enterprises and independent software vendors (ISVs). The lingering question of application code security follows, as stories of securit… Continue reading A leadership guide for mitigating security risks with low code platforms

Beating the OWASP Benchmark

Achieving a best-in-class OWASP Benchmark score with data and information flows
This post is an update to a previous research post authored by ShiftLeft’s Chief Scientist, Fabian Yamaguchi (https://blog.shiftleft.io/beating-the-owasp-benchmark-24a7b160… Continue reading Beating the OWASP Benchmark

Beating the OWASP Benchmark

This post is an update to a previous research post authored by ShiftLeft’s Chief Scientist, Fabian Yamaguchi (https://blog.shiftleft.io/beating-the-owasp-benchmark-24a7b1601031). In the last article, he evaluated ShiftLeft’s static analysis tool agains… Continue reading Beating the OWASP Benchmark

Wind River’s enhancements deliver cybersecurity and anti-tamper protection

Wind River announced security enhancements to Wind River Studio, a cloud-native platform for the development, deployment, operations, and servicing of mission-critical intelligent systems. Studio enables companies to meet rigorous cybersecurity and ant… Continue reading Wind River’s enhancements deliver cybersecurity and anti-tamper protection

Cequence Security API Sentinel 2.0 helps orgs strengthen their runtime API protections

Cequence Security announced the release of API Sentinel 2.0, adding powerful features that will help organizations strengthen their runtime API protections by “shielding the right” – a necessary step that is often minimized while impl… Continue reading Cequence Security API Sentinel 2.0 helps orgs strengthen their runtime API protections

API Security Need to Know: Lessons Learned From the Peloton Security Incident

By now most have heard about the Peloton data breach incident and no doubt the security team at Peloton is working long, hard hours to pull themselves out of this horrible situation. The damage is done but there are lessons we can, and should, learn fr… Continue reading API Security Need to Know: Lessons Learned From the Peloton Security Incident

Blocking Bots: Why We Need Advanced WAF?

With everyone living online these days, web traffic to the online channels is on the upsurge. However, if you delve into the traffic, you’ll see that most of the traffic.
The post Blocking Bots: Why We Need Advanced WAF? appeared first on Indusface.
Th… Continue reading Blocking Bots: Why We Need Advanced WAF?