Only half feel that they are adequately prepared in preventing attacks, according to KPMG.
Cyphort investigated the practices used by cyber criminals to inject malicious advertisements into legitimate online advertising networks.
Mistakes do play a part in security breaches, more often than not it’s a far simpler mistake: innocent errors of judgment that are leaving businesses and government networks exposed to massive data loss and financial ruin.
In this interview, Ron Zalkind, CTO and co-founder of CloudLock, talks about the top cloud security threats.
ProtectWise CEO Scott Chasin and CTO Gene Stevens wanted to give users a helpful security tool with an interactive visual dashboard that looks straight out of Call of Duty.
Discussions about security intelligence still focus primarily around conventional reactive SIEM. Security pros need to move from this reactive model to proactively using this security intelligence to protect their businesses.
Today almost every company is dealing with big data in one way or another – including customer data, tracking data, and behavioral marketing information – connecting every aspect of our lives. While this is a cutting edge use of technology, data monitoring can become dangerous when placed in the wrong hands.
Robert Hansen, Vice President of WhiteHat Security Labs, discusses the evolution of web application security, offers advice on how to improve web application security practices, recommends tools, and more.
The biggest contributors to security budget spend are the short-term, lower-priority challenges of internal compliance errors and accidental data leaks.
While there is an increasing recognition in many organizations that application security is an important piece of the overall puzzle, putting together a comprehensive strategy that will effectively reduce an organization’s risk profile is not easy.