How ShiftLeft catches vulnerabilities during code development

When cybersecurity experts talk about shifting the fixing of problems to the left, they mean moving…

Why hacking leads to less security respect

Hacking One of the biggest trends, emphasized especially by motivational videos and social media, has been…

Top application security tools for 2019

The 2018 Verizon Data Breach Investigations Report says most hacks still happen through breaches of web…

Endpoint security suites must have these features

The movement toward next-generation endpoint security has accelerated over the last few years for a simple…

The life and death of a document: where did it really go?

I’m a curious person, as I bet you are, too. I wonder about a lot of…

A patch in time saved nine

If you think back only about 10 years ago, Microsoft Windows Update was a part of…

The 17 biggest data breaches of the 21st century

Data breaches happen daily, in too many places at once to keep count. But what constitutes…

How devsecops protects appsec from the cybersecurity skills gap

In an analysis of ESG’s annual survey on the state of IT, security analyst Jon Oltsik…

The CSO guide to top security conferences

There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we…

OnePlus says up to 40,000 customers affected by credit card breach

OnePlus, the company behind a popular line of Android devices, said on Friday that up to…

How do you secure the cloud? New data points a way

The march toward the cloud for data and services has many companies rethinking their approach to…

Rating software security Consumer Reports-style

The poor security of much enterprise software can be dramatically improved at low cost with the…