Security News

Check in here for all the late-breaking AppSec news, including details about new vulnerabilities and recent breaches.

Cybersecurity and Corporate Liability

eseymour's picture
By Eric Seymour November 5, 2015  | Security News

Security is now the second leading risk to a company’s brand – ahead of traditional risks related to safety, health, and the environment, according to Deloitte. It should come as little surprise that legal risk related to cybersecurity is becoming a major concern for corporate directors. Pressure is building for boards and management teams to deal with cybersecurity issues that can... READ MORE

Open Letter to Joe Biden - Consider security as your next career move

jlavery's picture
By Jessica Lavery October 22, 2015  | Security News

Dear Vice President Biden, Joe, may I call you Joe? For months, political pundits, voters and the Democratic Party have been asking “will he or won’t he” with regard to your potential presidential intentions. On Wednesday, when you stood in the White House Rose Garden and announced that you will not run for president in 2016, you marked the end of what CNN described as your... READ MORE

Chinese Using SQL Injection for Cyberattacks on Pharma & Technology Firms

pneray's picture
By Phil Neray October 21, 2015  | Security News

Summary Cyberattackers linked to the Chinese government are attacking pharmaceutical and technology firms to steal their intellectual property, with 13 attempts identified during the past 30 days alone. Many of the intrusions were done through Web server compromises, with SQL injection being the prefered vector of implanting malware scripts which provide privileged access to internal networks.... READ MORE

Cybersecurity in Manufacturing: Fact or Fabrication?

dbonderud's picture
By Doug Bonderud October 19, 2015  | Security News

Manufacturers face a significant challenge when it comes to cybersecurity. Along with the task of protecting internal network systems and trade secrets, IT professionals are also on the hook to develop defensible architecture for any Internet-enabled technology they develop and deploy. The result? Cybersecurity in manufacturing is often more fabrication than fact. According to Veracode's... READ MORE

Top 5 Lessons C-Level Executives Can Learn From British Security Professionals

sdrew's picture
By Shawn Drew October 16, 2015  | Security News

While suffering a cyberattack may be an eventuality these days, one organization's experience with cybercrime can be very different from another's. Anecdotal evidence from business leaders regarding information security can be interesting, but it's impossible to understand what's truly going on in the industry without gaining insight from hundreds of organizations. That's why... READ MORE

Threat Intelligence Sharing: Is Your Enterprise Ready?

sdrew's picture
By Shawn Drew August 25, 2015  | Security News

There's little wonder why the concept of threat-information sharing is becoming so popular: It represents a state where security professionals can share and access real-time threat information, greatly increasing their ability to respond to emerging threats. But while the concept of open threat intelligence is gaining significant traction, the movement is still truly in its infancy.... READ MORE

SOS: Security Remediation and the Future of Training

ewade's picture
By Evan Wade August 19, 2015  | Security News

In some ways, training is one of the most inherently scalable practices a growing business can implement. What's easier than putting a bunch of employees in a conference room or requiring them to sign into a web-based program, after all? In other ways, however, crucial tasks such as coaching and continuing education don't always get the treatment they deserve, especially as an... READ MORE

The Rise in Global Cyberattacks Highlights the Dangers of Cyberespionage

ppaganini's picture
By Pierluigi Paganini August 19, 2015  | Security News

Recently, the US government announced that a major data breach, likely backed by Chinese hackers, had exposed the data of over 4 million government workers. Government officials believe this incident could be one of the largest breaches of federal employees' data. Though drastic, this is just one of many episodes demonstrating the rise of cybercrime. The number of cyberattacks on the global... READ MORE

Veracode A Leader in Gartner Magic Quadrant for 3rd Year Running

eseymour's picture
By Eric Seymour August 10, 2015  | Security News

Why did Gartner place Veracode as a Leader in the 2015 Magic Quadrant for Application Security Testing1 (AST) for the third year in a row? In Gartner’s own words, leaders are chosen based on their completeness of vision and ability to execute. That’s borne out by the fact that in 2014 alone, we helped our customers identify and remediate 4.7 million vulnerabilities –... READ MORE

Smart Devices Pose Many Challenges to IoT Security — Is Your Company Up to the Challenge?

ppaganini's picture
By Pierluigi Paganini July 30, 2015  | Security News

Internet of Things (IoT) devices are everywhere, and they're not going away any time soon: Experts at Cisco speculate that in 2020 there will be more than 50 billion connected devices, including wearable health, connected vehicles and smart grids. And the paradigm set by the ever-present gadgets has significantly changed society's perception of technology, with almost every sector... READ MORE

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.




contact menu