Web App Security

D5cad47c94727a4c525129559ae89d17

CVE-2018-11776 — The Latest Apache Struts Vulnerability

September 04, 2018 Added by:Fred Bals

A Critical security flaw (CVE-2018-11776) impacts Apache Struts 2.3 through 2.3.34, Struts 2.5 through 2.5.16, and possibly unsupported versions of the popular Java framework.

Comments  (0)

53c787f0dd688c758b5610aa09af8f13

How Secure Are Popular Finance Apps on Google Play?

September 04, 2018 Added by:Min Pyo Hong

Analysis of the top free Android finance apps on Google Play revealed critical, medium and low security vulnerabilities.

Comments  (0)

0b8e9d7009308c174e700bcaf89c4474

Q3 Oracle CPU Preview: Fewer Java SE Patches May Not Mean Fewer Flaws

July 16, 2018 Added by:James Lee

The July 2018 quarterly Oracle Critical Patch Update (CPU) is expected to set a new two-year high for total Oracle product patches.

Comments  (0)

D47111ebac9e529cc7e382f0f095f32b

"Can you Hear Me Now?” - Security Professionals Warn about Who May Be Listening

June 27, 2018 Added by:Jeannie Warner

In light of the recent move by Verizon to stop sharing location data with third parties, companies need to rethink strategies for data gathering from users.

Comments  (0)

0a36f423b9a230eb25d9f024fb71c03c

Machine Learning vs. Deep Learning in Cybersecurity – Demystifying AI’s Siblings

June 13, 2018 Added by:Guy Caspi

To fully understand “machine learning” and “deep learning,” it’s worth taking a look at each subfield’s advantages and limitations.

Comments  (0)

B5e8617f76698eb78f0101a3db9326ae

Achieving Effective Application Security in a Cloud Generation

May 16, 2018 Added by:Jonathan Bregman

Cloud application security requires new approaches, policies, configurations, and strategies that both allow organizations to address business needs and security risks in unison.

Comments  (0)

6648b1abd4a9b964566c3690613f20a6

GDPR Is Coming. Is Your Organization Ready?

May 01, 2018 Added by:Mark Baldwin

The General Data Protection Regulation (GDPR) that goes into effect on May 25 affects any business that processes information of any EU citizen, regardless of whether the business is located in or has operations in the EU.

Comments  (0)

9d9e32000b07da9c5acd1ad33accbbb6

Advancing the Usability of PKIs

February 06, 2018 Added by:Dan Timpson

If your organization is going to rely on PKI, it’s important to also leverage the benefits that automation can provide.

Comments  (0)

9ae0fe776de46500a4f71f32673fad0f

Increasing Importance of Mobile Makes Malware a Priority

January 17, 2018 Added by:Asma Zubair

Businesses should fortify their high value apps with additional security precautions from the inside out.

Comments  (0)

Ac61693522e1c081485f696ae6a5fb4b

The 5 Motives of Ransomware

January 04, 2018 Added by:Joseph Carson

Who would have foreseen the impact of both WannaCry and NotPetya

Comments  (0)

3013a8d01542d3101f0a905ab013f00a

Shadow IT: The Invisible Network

November 14, 2017 Added by:Chris Jordan

Shadow IT is the term most related to the risk associated with the threat that application awareness addresses.

Comments  (0)

B5e8617f76698eb78f0101a3db9326ae

The Evolution from Waterfall to DevOps to DevSecOps and Continuous Security

November 03, 2017 Added by:Jonathan Bregman

The evolution of application development and the need for automated and continuous security, monitoring and incident response through the application lifecycle and beyond deployment.

Comments  (0)

E9a7f6f166af1eddf525c57aa3b4f1b6

Oracle CPU Preview: What to Expect in the October 2017 Critical Patch Update

October 17, 2017 Added by:James E. Lee

In a pre-release statement, Oracle has revealed that the October Critical Patch Update (CPU) is likely to see nearly two dozen fixes to Java SE, the most common language used for web applications.

Comments  (0)

E181257171d17cbf437b89cc372e76bc

Hey Alexa – Show Me Whitelisted Malware

October 10, 2017 Added by:Troy Kent

The team at Awake Security recently took a closer look at one seemingly benign list – the Alexa Top 1 Million list of domains – to assess whether it would be safe to use for whitelisting.

Comments  (0)

591c39c65cf5c298ccd0f1cd5818e961

The Weakest Link In Banking Security – ATMs

October 03, 2017 Added by:Vanishree Rao

We have recently seen the weak link theory play out with the very familiar Automated Teller Machines (ATMs) that are used regularly around the globe.

Comments  (0)

549d6bdceeadaa2dbb3424e069276645

No Such Thing as Too Small to Hack

September 07, 2017 Added by:Avi Bartov

Technology alone does not equal security, as owners and employees must begin to realize that their websites offer a potentially immense value proposition to hackers. An SMB is definitely not too small to care.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »