Security News

Check in here for all the late-breaking AppSec news, including details about new vulnerabilities and recent breaches.

Threat Intelligence Sharing: Is Your Enterprise Ready?

sdrew's picture
By Shawn Drew August 25, 2015  | Security News

There's little wonder why the concept of threat-information sharing is becoming so popular: It represents a state where security professionals can share and access real-time threat information, greatly increasing their ability to respond to emerging threats. But while the concept of open threat intelligence is gaining significant traction, the movement is still truly in its infancy.... READ MORE

SOS: Security Remediation and the Future of Training

ewade's picture
By Evan Wade August 19, 2015  | Security News

In some ways, training is one of the most inherently scalable practices a growing business can implement. What's easier than putting a bunch of employees in a conference room or requiring them to sign into a web-based program, after all? In other ways, however, crucial tasks such as coaching and continuing education don't always get the treatment they deserve, especially as an... READ MORE

The Rise in Global Cyberattacks Highlights the Dangers of Cyberespionage

ppaganini's picture
By Pierluigi Paganini August 19, 2015  | Security News

Recently, the US government announced that a major data breach, likely backed by Chinese hackers, had exposed the data of over 4 million government workers. Government officials believe this incident could be one of the largest breaches of federal employees' data. Though drastic, this is just one of many episodes demonstrating the rise of cybercrime. The number of cyberattacks on the global... READ MORE

CA Veracode A Leader in Gartner Magic Quadrant for 3rd Year Running

eseymour's picture
By Eric Seymour August 10, 2015  | Security News

Why did Gartner place CA Veracode as a Leader in the 2015 Magic Quadrant for Application Security Testing1 (AST) for the third year in a row? In Gartner’s own words, leaders are chosen based on their completeness of vision and ability to execute. That’s borne out by the fact that in 2014 alone, we helped our customers identify and remediate 4.7 million vulnerabilities –... READ MORE

Smart Devices Pose Many Challenges to IoT Security — Is Your Company Up to the Challenge?

ppaganini's picture
By Pierluigi Paganini July 30, 2015  | Security News

Internet of Things (IoT) devices are everywhere, and they're not going away any time soon: Experts at Cisco speculate that in 2020 there will be more than 50 billion connected devices, including wearable health, connected vehicles and smart grids. And the paradigm set by the ever-present gadgets has significantly changed society's perception of technology, with almost every sector... READ MORE

The Home Depot Breach Offers Key Lessons for Those Hoping to Avoid a Similar Fate

ewade's picture
By Evan Wade July 27, 2015  | Security News

Retail stores (and especially big-box, multiple-store, nationwide retail businesses) face unique security challenges when adapting to advancements in the digital age. Whether you're talking about the Internet or the smart devices that made it mobile, as a result of their existence, big-name resellers collect tons of sensitive consumer information every minute of every hour of every day... READ MORE

Branded Vulnerabilities May Change Enterprise Security

sdrew's picture
By Shawn Drew June 1, 2015  | Security News

For as long as malware, viruses and assorted vulnerabilities have existed, the most significant among them have been given names by the media. Lately, however, the practice of naming security flaws has evolved, building into a legitimate branding campaign for issues found in existing software. While seemingly benign, the practice of branding security issues may affect the way these flaws are... READ MORE

VENOM – Not as Deadly as a Heartbleed

jlavery's picture
By Jessica Lavery May 13, 2015  | Security News

This morning, CrowdStrike issued a vulnerability disclosure for CVE-2015-3456 — branded VENOM (Virtualized Environment Neglected Operations Manipulation). VENOM is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. I’ve seen a few articles from reputable outlets claiming that the vulnerability is “bigger than Heartbleed.... READ MORE

As Security Software Is Wasted, Establishing a Secure Development Process Is Crucial

sdrew's picture
By Shawn Drew May 6, 2015

Investing in security software is one of the wisest decisions business leaders can make, given the rampant growth in hacking and data theft over the past few years. But new research shows a significant portion of purchased security-related software is simply going to waste. Armed with this knowledge, every developer should establish a secure development process — or risk taking the blame when a... READ MORE

Don't Let Credit Card Hacking Happen to You!

jmontesi's picture
By John Montesi January 9, 2015  | Security News

In recent weeks, both Kmart and Staples have been victims of credit card hacking. This isn't the first time a major retailer has been attacked in such a way: According to the New York Times, Kmart and Staples have joined the ranks of Target, Home Depot, Sally Beauty Supply, the United Parcel Service, Dairy Queen and countless other retail stores and restaurants that "have had their in-... READ MORE

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.

 

 

 

contact menu