In light of COVID-19 precaution measures, we remind that all ImmuniWeb products can be easily configured and safely paid online without any human contact or paperwork.
Weekly newsletter on AI, Application Security & Cybercrime
Your data will stay confidential
Join our 14,268 followers
High-Tech Bridge’s CEO Ilia Kolochenko shares some of the industry trends and major threats companies and individuals will likely face in 2019.
While targeted attacks against voters and the election process are growing in 2018, insecure websites and phishing remain the most frequent attack vectors.
Being a Group Data Protection Officer at VFS GLOBAL and a recognized privacy expert, Barry Cook explores practical enforcement of GDPR in the era of AI.
The compilation of the Top 10 notorious cryptocurrency exchange breaches and cryptocurrency thefts occurred in 2018 (so far).
With the increasing popularity of mobile banking and mobile apps, the risks of mobile hacking are also growing. Here are top 10 of 2018’s most notable mobile breaches and incidents.
The most disastrous web and mobile application security data breaches and security incidents of 2018 (so far).
Addressing Shadow IT, legacy and abandoned applications for a holistic risk management program.
Dr. Maria Bada, Cambridge Cybercrime Centre, explains the intricate nature of global cybercrime, its prevention and prosecution under international and national law.
In the second part, we dive into product deployment and maintenance practice to integrate security into the DevOps process.
In this deeper-dive series, we will more closely examine the practicalities and challenges of each of Gartner’s suggested steps for DevSecOps adoption.
Abandoned, shadow and legacy applications undermine cybersecurity and compliance of the largest global companies despite growing security spending.
DevOps is a growing and useful paradigm in web application development, but it fails to address the security issues plaguing today’s marketplace. The principles of DevOps, ...