Modern CISO challenges: Implementing DevSecOps, improving security operations
We sat down with Aaron Contorer, CEO at FP Complete, to learn more about what enterprises can do to increase their cybersecurity, the …
We sat down with Aaron Contorer, CEO at FP Complete, to learn more about what enterprises can do to increase their cybersecurity, the …
Introduction In earlier years, everyone depends on SOC (includes firewalls, WAF, SIEM,etc.) and the prioritize in building the SOC provides …
On the 12th of December, following the comprehensive timeline report detailing what happened during the Equifax Breach, the Subcommittee on …
More than half a decade ago, Intel co-founder, Gordon Moore, published a paper predicting the pace for the digital revolution. Moore’s …
This SQLite bug can be triggered, if the victim explores a simple webpage in the browser that uses SQLite and the Web SQL API. “According …
Adopting a modern application architecture is critical to business success and a significant driver of profit growth in today’s digital …
For organizations to identify security threats and vulnerabilities, mitigate risk, ensure operational compliance and combat fraud, a …
Cold Boot Attacks allow let hackers steal the encryption keys, Passwords, credentials to corporate networks via new physical hack into all …
Having had the experience of building a SOC in the middle of a crisis in his former post, Steve Moore, chief security strategist at …
As quoted by Albert Einstein, “compound interest is the eighth wonder of the world and the most powerful force in the universe, even more …
We have seen disruptions affect every industry during the last millennia. From chemical photography to digital photography, from horse …
Leading organizations understand that data breaches have become the norm in today’s Application Economy. With information everywhere and …
1 min ago Often adding new parts to an operating system or application opens up the possibility of new bugs or exploits. Such appears to be …
Today, all organizations are digital by default. However, it has never been more difficult for organizations to map the digital environment …
Great to be able to speak with Alex Salazar, VP Product, Development and Integration Ecosystem at Okta, about their new API offering. API …
Every iOS app requires a certificate from Apple to publish apps to the App Store. The certificates are required to code sign iOS …
As the threat landscape changes, so too do demands on cybersecurity leaders and their teams. Art Coviello, executive chairman (ret.) of …
Documenting your thoughts and processes are an important part of any off-the-shelf hacker project. At the very least, you’ll want to …