Page 18
More than half of business WAF users are not happy with their WAF. Learn why, and how to stop it happening to you.
Severe vulnerability in popular app exposed - but what does it mean for business?
In spite of significant theft from a ‘hot wallet’, crypto exchange Binance has pushed a lot of the right buttons to maintain reputation - at least so far.
Two separate vulnerability reports serve to illustrate that even best practice processes can fall short in the real world.
Following the state of California the UK government has proposed IoT security regulation measures and requirements which were broadly welcomed by security experts.
The actual cost to business victims of ransomware has increased dramatically in 2019...
New WordPress bug, enterprise data exposure via misconfigured Box Enterprise accounts, massive mobile adware and data stealing campaigns aimed at Android users, and more.
0Days in Adobe ColdFusion and Google Chrome, privacy risks of Android VPN apps, an official approval for the WebAuthn Web standard, and more.
Nation-state cyber-attacks are no longer rarities. Partly it is 'weapons-testing' and partly it is economic espionage.
Dangerous flaws in the SHAREit Android app, recent attacks exploiting the latest Drupal bug, malicious docs distribution on hacked Bangladeshi embassy website, and more.
Bug bounties are a form of results-based outsourced code checking. It is a cost-efficient and effective method of crowdsourcing a company’s code analysis, while paying only for ...
User accountability, improved security & forensics, adhering to compliance and easy troubleshooting are just a few of the benefits of keeping an activity log on your WordPress site.