Security News

Check in here for all the late-breaking AppSec news, including details about new vulnerabilities and recent breaches.

Message Encryption Is Great—Depending On Who Has The Key

eschuman's picture
By Evan Schuman October 14, 2016  | Security News
Message encryption.

Corporate execs are understandably worried these days about all of their electronic communications. Whether messages can be intercepted by corporate spies working for the opposition, government investigators snooping for terrorists or cyberthieves looking to steal what they can get, anything that is intercepted can wind up somewhere else. See Edward Snowden. It's therefore quite... READ MORE

DevOops Redux: A Chat with Chris Gates and Ken Johnson

Neil's picture
By Neil DuPaul October 12, 2016  | Security News

This week at OWASP AppSec USA there's a schedule packed with great sessions focusing on devops, shifting left, automation and more. I was lucky enough to get some time from Chris Gates, Sr Security Engineer, Uber and Ken Johnson's, CTO nVisium, busy schedule to ask them a few questions related to their session at AppSec, DevOops: Redux - a defense oriented follow up to their popular talk... READ MORE

Five signals that the future is strong for Boston’s Women in Tech

mloughlin's picture
By Maria Loughlin October 11, 2016  | Security News
RevBoston 2016 Badass Women

This weekend I was among 21 women recognized as a Rev Boston “Badass” woman in tech. My co-honorees and I are senior leaders in tech who work at landmark institutions (e.g. Boston Children’s Hospital), high-flyer local companies (e.g. Veracode, WayFair, HubSpot, Carbon Black, CarGurus), as well as mid-size and tiny startups (e.g. Toast, Drizly, TetraScience, clypd,... READ MORE

Has The Media Finally Figured Out The Importance Of App Security?

eschuman's picture
By Evan Schuman October 7, 2016  | Security News
Image of crowd of press representatives.

It certainly has taken long enough, but it seems like non-tech media outlets have figured out that applications make wonderful entry points for cyberthieves. Given the layers of complexity that many enterprise apps feature today, it's hardly surprising that they boast massive security holes. That message seems to be finally sinking in. Consider just a few recent media reports, from NBC News... READ MORE

How to Get Developers and Security to Win-Win This Cyber Security Awareness Month

jzorabedian's picture
By John Zorabedian October 5, 2016  | Security News

October is National Cyber Security Awareness Month (NCSAM), a commendable public-private initiative focused on training businesses and users in practicing better digital hygiene. If there’s one drawback to awareness programs like NCSAM, it’s the potential for awareness to spike in the short-term and fall off in the long-term. Without follow-up training and continuous learning,... READ MORE

How Soon Will We See the First Billion-Dollar Security Vulnerability?

jzorabedian's picture
By John Zorabedian October 3, 2016  | Security News
Billion dollar security breach.

In a shocking announcement last month, Yahoo confirmed that data on 500 million user accounts was compromised in 2014, the largest data breach in history. Could it also become the most expensive?" Yahoo is in the final phases of a deal with Verizon to sell itself to the telecom giant for a mind-boggling sum of $4.8 billion. The breach bombshell can’t have gone over well in Verizon... READ MORE

Why Apple Won't Ever House A Security Backdoor

eschuman's picture
By Evan Schuman October 3, 2016  | Security News
Apple and software backdoors.

Much has been written about Apple's official stance against giving law enforcement an encryption backdoors into its customers' files. And Apple's firm position against a backdoor has been painted as a marketing decision, as it gives people a really good reason to buy Apple devices instead of Android or something else. On top of that reality is the argument that a backdoor isn't... READ MORE

Podcast: Cyberwar and Voter Fraud

jlavery's picture
By Jessica Lavery September 30, 2016  | Security News
Voter Fraud by Hacking is Possible

Can it really happen? The Hollywoodesque version of cyber voter fraud would go like this – an enemy nation state would support the candidate they felt best represents their interest. This government would possibly find ways to infuse money into the candidate’s campaign. Not content with simply influencing the election with illegal campaign funds and propaganda, the nation state would... READ MORE

The Push to Replace Passwords

sporemba's picture
By Sue Poremba September 25, 2016  | Security News 3
Is password security weakening?

At Black Hat 2016, Thycotic conducted a survey of both self-identified white hat and black hat hackers. In part, the survey found that more than 75 percent of respondents believe no password is safe from hackers or the government, and nearly half said they would be willing to hack your password for a fee if asked by the FBI. It’s yet another bad rap on passwords, which have been the... READ MORE

Security's Weak Communications Skills Can Undermine Safety

eschuman's picture
By Evan Schuman September 23, 2016  | Security News
Communication takes effort and time, poor communication will hinder results!

It's hardly a revelation that hardcore security veterans are not at the pinnacle of clear communication. And the more technical the talent, in general, the weaker the communication. For most in IT and almost everyone in corporate outside of IT, this is generally dismissed as a fact-of-life. But I've recently started to wonder if this isn't a bigger problem and one that can undermine... READ MORE

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.




contact menu