What are the consequences of data breaches under GDPR? Complying with increased regulations means better understanding application security.
Facebook has extended their long-running bug bounty program to include data misuse by third-party application providers.
Posted in Data Breach Security | Comments Off on Data misuse is a first-class security concern
Yet another cyber attack on a critical infrastructure installation ought to send yet another warning to operators of industrial control systems (ICS) that it is long past time to, as they say, harden their defenses.
Posted in Data Breach Security | Comments Off on TRITON attack: A failure this time, but still ominous
A recently discovered flaw that undermines the security of numerous single sign-on (SSO) services has been patched by four major providers. But the risk remains for those who don’t install available patches and those for whom no patch is available yet. It’s true that SSO’s major selling point is convenience, not security It makes it easier, and much quicker, to sign into multiple applications, platforms, servers, and so on.
Posted in Data Breach Security | Comments Off on SSO flaw fixed for some, but risk remains
It shouldn’t have happened because it shouldn’t have been possible. The current attack surface of vulnerable Memcached servers is significant. Read on.
Posted in Data Breach Security | Comments Off on The GitHub Memcached DDoS: It shouldn’t have happened
As malware attacks go, this one was relatively benign. But that doesn’t mean it shouldn’t be taken seriously.
Posted in Data Breach Security | Comments Off on Small crypto mining attack points to big browser problem
The Hide and Seek botnet goes after some of the billions of devices that compose the IoT attack surface. Learn how to defend IoT devices against botnets.
2017—a turbulent year in application security From breaches making headlines to exciting new technologies, 2017 was abuzz with conversation around securing applications and the implications of access to personal data. We saw what can happen when sensitive data is not properly secured, providing a sharp reminder of why application security is so important. Looking ahead, we need to reflect on emerging threats, technologies, and practices in application security in 2017, so organizations can prepare for building secure applications in 2018.
Posted in Data Breach Security | Comments Off on The best way to secure applications in 2018? Learn from 2017
Small and medium-size businesses (SMBs) are nonsubsidiary, independent firms that employ fewer than a given number of employees. This number varies from country to country: Gartner defines an SMB as having fewer than 1,000 employees, but the European Union defines an SMB as having fewer than 250 employees. Managing an SMB budget Many factors affect the management of any budget. For an SMB, these factors include (but aren’t limited to) these:
As the use of open source continues to rise, many organizations are unprepared to defend their systems from attacks against open source vulnerabilities.