OpenColleges.edu recently produced this great interactive graphic on internet safety. The graphic has a lot of information on some of the most widespread internet threats to your children including cyber bullying, identity theft, and computer viruses. In addition the graphic covers the topic of plagiarism and goes on to promote general internet safety tips for all circumstances. The graphic comes out of Australia so many of the recommended resources are based down under but a quick Google search should turn up resources in your respective countries.
OWASP released its oft-cited Top 10 list of web application vulnerabilities. But maybe we’d be better with an OWASP Top 1!
OWASP – The Open Web Application Security Project – released its official OWASP Top 10 list for 2013 on Wednesday – the first major update to the oft-cited list of common web application vulnerabilities in three years.
The rise of BYOD friendly workplaces means employees are now downloading personal apps on devices that have access to corporate as well as private data. It is not uncommon for useful and seemingly harmless applications to be designed to perform tasks that are unrelated and unnecessary to the advertised function of the app.
It’s a big day for us here at Veracode and those attending the the Gartner Security & Risk Management Summit can get a sneak preview of our latest offering. Today we’re launching our Mobile Application Reputation Service or as we’ve come to refer to it, MARS! BYOD has been a subject at the forefront of enterprise security concerns because of its complexity and user driven nature. MARS will help enterprises and federal agencies prevent accidental data leakage due to the use of risky mobile applications.
The following video is a recording of a webinar run on May 7th, 2013. The webinar, jointly run by UBM Tech, CRN and Veracode features Rob Westervelt, Senior Editor of CRN and Evan Fromberg, Senior Director of Worldwide Channel and Business Development at Veracode. The two look at data breach trends reported in the 2013 Verizon DBR and what can be done in the face of the current threat landscape.
An FTC-run panel finds the smartest company on earth playing dumb on mobile security.
Google joined the world’s other leading mobile device and operating system makers this week for a forum on mobile threats and security, where the world’s smartest technology company played it kind of dumb.
I stumbled upon this great pdf from CTIA-The Wireless Association this morning detailing steps for properly backing up and removing all data from old smartphones or other mobile devices before you donate or recycle them. They also include helpful links to gowirelessgogreen.org which offers information on where and how to recycle your device and accessories, and also some additional apps and tips you should employ if your current mobile device is ever lost or stolen at beforeyouloseit.org.
It is a fact universally acknowledged that an organization in possession of a good policy must also be in possession of an exception process; the stricter the policy, the more efficient the exception process. While this piece of wisdom can be usually applied to any area, it is doubly true when it comes to application security policies and processes. These must contend not only with resource and budget constraints within the security teams, but also with the ever increasing need to accelerate time-to-market and deliver feature rich applications by development organizations.
Some 41% of all security incidents this year hit application servers and digital documents.
This shocking digital security trend was revealed by the Verizon Data Breach Report a vast record comprising 47,000 of the most important security incidents, data leaks and malware compromises.
Yesterday Ernest & Young announced the finalists for the 2013 Ernst & Young Entrepreneur of the Year for the New England region – and Veracode’s very own Bob Brennan was on the list! The awards program recognizes high-growth entrepreneurs who demonstrate excellence and extraordinary success in areas such as innovation, financial performance and personal commitment to their businesses and communities. Award winners will be announced at an event on Wednesday, June 26, 2013.
Are APT hacking crews just modern day buccaneers? And, if so, how do we make them walk the plank?
When it comes to matters of information security, I’m a big fan of what might be called the “anti-exceptionalism” school of information security. That is: I reject the notion that the myriad of problems that we, the IT community, face in regard to security our networks, endpoints and the Internet are exceptional or extraordinary in any way.
Just a few months after being listed as #20 on Forbes’ “America’s Most Promising Companies”, Red Herring has named Veracode a winner in the Red Herring Top 100 North America list for 2013. The Red Herring Top 100 award recognizes the leading private companies from Americas, celebrating these startups’ innovations and technologies across their respective industries.
Last night our CTO and Co-Founder Chris Wysopal joined Fox Business’ The Willis Report to chat about medical record privacy in a segment titled “Digital Records Putting Your Health Information at Risk?“
Nothing’s free in this world, especially not when it comes to security. With Twitter officially cramping your style, you are now forced you to waste precious seconds you could be tweeting, by instead waiting for a verification code to be delivered to your phone just so you can login.