Retail and Hospitality Facing Deluge of Critical Web App Flaws

Retail and Hospitality Facing Deluge of Critical Web App Flaws

More than three-quarters of applications in the retail and hospitality sector contain at least one vulnerability, with a high percentage of these requiring urgent attention, according to Veracode. The application security vendor analyzed more than 130,000 applications to compile its latest State of Software Security report. However, while the 76% of buggy apps in the retail and hospitality sector is about average compared to other verticals, Veracode warned that 26% are high severity — one…

Read More

Report: 5 ways web apps suffered in 2020 and will continue to suffer in 2021

Report: 5 ways web apps suffered in 2020 and will continue to suffer in 2021

2020 was a security struggle in the world of web applications, and it isn’t going to get any better in 2021, research from cybersecurity provider Radware said. Image: Getty Images/iStockphoto The 2020-2021 State of Web Application Security Report is out from cybersecurity vendor Radware, and it paints a grim picture of security over the past 12 months and a similarly bleak view for the rest of 2021.  Among the findings Radware uncovered in its survey…

Read More

Social engineering gains momentum with cyber criminals – FedScoop

Social engineering gains momentum with cyber criminals – FedScoop

Written by Ryan Witt Jan 20, 2021 | FEDSCOOP Ryan Witt is a healthcare cybersecurity leader at Proofpoint with more than 15 years of experience advising healthcare institutions. The COVID-19 pandemic represents the largest public health crisis in a century. As cyber attackers seek to exploit the crisis, it has also become a major security issue for healthcare organizations. Ryan Witt, Healthcare Cybersecurity Leader, Proofpoint Attackers do not view the world in terms of a…

Read More

IT Governance Blog: the psychology of information security

IT Governance Blog: the psychology of information security

Your employees encounter potential cyber security threats on a daily basis. Perhaps there’s a new face in the office that they don’t recognise, or a new password they need to remember, or a database of sensitive information that they need to upload onto the Cloud. In The Psychology of Information Security, Leron Zinatullin explains how employees respond to those challenges and explains why they make the decisions they do. For example, he found that employees usually…

Read More

5 minutes with Alan Duric – Security, privacy and more

5 minutes with Alan Duric – Security, privacy and more

5 minutes with Alan Duric – Security, privacy and more | 2021-01-20 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Advances in deep learning & predictive analytics will significantly increase video intelligence capabilities in 2021

Advances in deep learning & predictive analytics will significantly increase video intelligence capabilities in 2021

Advances in deep learning & predictive analytics will significantly increase video intelligence capabilities in 2021 | 2021-01-20 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More

Misinformation campaigns will dominate cybersecurity headaches in 2021

Misinformation campaigns will dominate cybersecurity headaches in 2021

Misinformation campaigns will dominate cybersecurity headaches in 2021 | 2021-01-20 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Improving Your Security Posture with the Pipeline Cybersecurity Initiative

Improving Your Security Posture with the Pipeline Cybersecurity Initiative

A few years ago, I worked alongside some oil commodity traders. Environmental concerns aside, I never realized how many parts were required to get the oil out of the ground, not to mention everything else that finally resulted in the production of refined products that surround our lives. As a cybersecurity professional, I was more interested in how all the pipelines were intertwined and, of course, protected. When the commodity traders asked me to install the…

Read More

Data Classification Is Data Storage – Schemas and Correct Storage

Data Classification Is Data Storage – Schemas and Correct Storage

‘Business’ is a verb that practically means the movement of data. If you aren’t sharing data – keeping the books, sharing ideas and stats about sales, getting the correct information regarding the customer or data to the customer – then you aren’t doing much business. But organizations need to protect their data along the way. Infosec has so many ways of protecting those sources of data, so much so that users of the data often…

Read More

The aftermath of the SolarWinds breach: Organizations need to be more vigilant

The aftermath of the SolarWinds breach: Organizations need to be more vigilant

Security experts say organizations are, and should, implement a number of changes ranging from how they vet vendors to handling application updates. Image: Getty Images/iStockphoto The way Nick Fuchs sees it, in the aftermath of the massive SolarWinds breach, there has been one silver lining: A greater understanding of the important role security needs to play in any organization. Not only is there an “obvious opportunity to learn from the event,” but also an awareness…

Read More
1 2,438 2,439 2,440 2,441 2,442 2,542