X-Force May 22, 2015 When Vendor Security Vulnerabilities Become Your Own 3 min read - Vendor security vulnerabilities can quickly become a major problem for your business, and it's up to you to minimize the risks involved.
Application Security May 20, 2015 10 Convenient Ways to Increase Your Mobile Application Security Knowledge 4 min read - Here are 10 resources that will help professionals improve their knowledge and understanding of the state of mobile application security.
Application Security May 19, 2015 How to Enhance Your Cryptographic Key Protection 6 min read - Understanding how keys are hacked and the practices used to access this critical information can ultimately improve cryptographic key protection.
Application Security May 13, 2015 The Application Economy and the Challenges of the Internet of Things 5 min read - Are technologies such as the Internet of Things putting businesses at risk? Can the application economy create opportunities that can be safely harnessed?
Application Security May 6, 2015 Challenges to Running an Effective Application Security Program 4 min read - Effective application security requires developers to take part in a multistep process covering many aspects of coding and testing.
Application Security April 29, 2015 No Authentication Without Trust 3 min read - Identity authentication should only be conducted after the person trying to access data or information has been deemed trustworthy by the organization.
Application Security April 28, 2015 Software Defenses to OWASP’s Top 10 Most Common Application Attacks 6 min read - Software developers must learn how to build security in from the ground up to defend against the most common application attacks, as determined by OWASP.
April 17, 2015 Dropbox Bounty: Big Bucks for Bugs? 2 min read - The new Dropbox bounty program looks to catch software vulnerabilities in their infancy by rewarding researchers. So far, payouts have no maximum.
April 17, 2015 SearchBlox Vulnerabilities Underscore the Importance of Updating Enterprise Search Tools 2 min read - A set of four SearchBlox vulnerabilities could allow cybercriminals to conduct cross-site scripting attacks and cause other potential problems.
Endpoint April 13, 2015 Mobile Security Framework: How to Keep Enterprises Secure 3 min read - In order to combat potential data breaches, organizations must focus their attention on mobile security and bring-your-own-device policies.