[Webinars] Open source, threat modeling, Node.js security

Hear about the state of open source in our Red Hat partner webinar, discover our approach to threat modeling, and learn how to secure Node.js applications.
The post [Webinars] Open source, threat modeling, Node.js security appeared first on Software I… Continue reading [Webinars] Open source, threat modeling, Node.js security

Hashing Functions – CISSP Domain 3

Today we’re going to take a quick look at hashing functions, as covered in Domain 3 of the CISSP common body of knowledge (CBK).  There is often some confusion between hashing, encryption, and encoding, so one of the purposes of this article… Continue reading Hashing Functions – CISSP Domain 3

Waving the White Flag: Why InfoSec should stop caring about HTTPOnly

As a company that is constantly working with our penetration testing clients on understanding where they should focus their efforts, qualifying risk is second-nature to us. On one hand, we never want to undersell a risk, and have a client accept that r… Continue reading Waving the White Flag: Why InfoSec should stop caring about HTTPOnly

Navigating Cybersecurity Metrics For Web Applications

Maintaining a resilient security posture is an ongoing effort for every organization. As reports of data breaches, fraud, and cyberattacks grow increasingly common, it’s important to have strategies in place to mitigate their impact. Whilst cyber… Continue reading Navigating Cybersecurity Metrics For Web Applications

Biomedical orgs working on COVID-19 vaccines open to cyber attacks

In a recently released report by the UK National Cyber Security Centre (NCSC), whose findings have been backed by Canada’s Communications Security Establishment (CSE) and the US NSA and CISA (Cybersecurity and Infrastructure Security Agency), the agenc… Continue reading Biomedical orgs working on COVID-19 vaccines open to cyber attacks

The Future of Zero Trust: Continuous Authentication

Ask any CISO about a trend that they think will help push security postures forward and you’ll inevitably hear the same thing: the elimination of the perimeter and the rise of the zero trust mindset. In the old perimeter model,…
The post Th… Continue reading The Future of Zero Trust: Continuous Authentication

40% of security pros say half of cyberattacks bypass their WAF

There are growing concerns around the number of businesses vulnerable to cyberattacks due to hackers’ ability to bypass their Web Application Firewall (WAF), Neustar reveals. Cyberattacks bypass the WAF 49% of security professionals reported more than … Continue reading 40% of security pros say half of cyberattacks bypass their WAF

[Webinars] DoS attacks in Node.js, SAST in DevSecOps

Learn how to protect Node.js apps against denial-of-service attacks, and how to integrate static application security testing into DevSecOps pipelines.
The post [Webinars] DoS attacks in Node.js, SAST in DevSecOps appeared first on Software Integrity … Continue reading [Webinars] DoS attacks in Node.js, SAST in DevSecOps