Weekly newsletter on AI, Application Security & Cybercrime
Your data will stay confidential
Join our 12796 followers
With the increasing popularity of mobile banking and mobile apps, the risks of mobile hacking are also growing. Here are top 10 of 2018’s most notable mobile breaches and incidents.
The most disastrous web and mobile application security data breaches and security incidents of 2018 (so far).
Addressing Shadow IT, legacy and abandoned applications for a holistic risk management program.
Dr. Maria Bada, Cambridge Cybercrime Centre, explains the intricate nature of global cybercrime, its prevention and prosecution under international and national law.
In the second part, we dive into product deployment and maintenance practice to integrate security into the DevOps process.
In this deeper-dive series, we will more closely examine the practicalities and challenges of each of Gartner’s suggested steps for DevSecOps adoption.
Abandoned, shadow and legacy applications undermine cybersecurity and compliance of the largest global companies despite growing security spending.
DevOps is a growing and useful paradigm in web application development, but it fails to address the security issues plaguing today’s marketplace. The principles of DevOps, ...
APIs and Web Services are widely used by modern mobile applications. Often underprotected, they are a common source of critical flaws and data breaches.
How attackers are getting into millions of WordPress websites and how to prevent this?
Equifax breach, WannaCry and NotPetya epidemics exploited flaws in shadow, legacy and abandoned applications. By definition, these applications cannot be patched, and thus pose a ...
Over 30% of the world's websites are currently built with the WordPress. From complex e-commerce sites to small personal blogs – all are targets for hackers.