Please turn on your JavaScript for this page to function normally.
Magnify
Custom code accounts for 93% of application vulnerabilities

Although third-party software libraries represent a majority of an application’s code, they account for less than seven percent of application vulnerabilities. Typically, …

ADAC test
Testing the security of connected cars and IoT devices

IBM Security announced the launch of two new security testing practice areas focused on automotive security and the Internet of Things (IoT). The new services will be …

Qualys CertView
Manage SSL/TLS certificates across IT environments with Qualys CertView

Qualys announced CertView, a new app framework in the Qualys Cloud Platform that enables customers to discover, assess and manage SSL/TLS certificates on a global scale, …

Google Play Protect
Google Play Protect scans for malicious apps

By now, many Android users that have the Google Play Store app on their devices should be able to find Google Play Protect in it. What is Google Play Protect? Google Play …

people
Addressing the deficit in cyber security workforce and national policy

Whether they like it or not, in this day and age nearly all organizations have to think about their cybersecurity posture and find a way to minimize cybersecurity risk. But …

GDPR
As GDPR approaches, retail data breaches remain unacceptably high

Two in five retailers across the globe have experienced a data breach in the past year, according to Thales and 451 Research. The report reveals that 43 percent of retailers …

connection
IT operators see promise in DevOps and new tech

A new Ponemon Institute survey of nearly 1,250 global public sector IT decision makers and managers revealed that public sector organizations undergoing digital transformation …

geometry
Week in review: macOS security, Segway vulns, and the SOC of the future

Here’s an overview of some of last week’s most interesting news and articles: The future of macOS security: Baked-in protection and third-party tools Anyone in the …

Black Hat
Qualys at Black Hat USA 2017: Best practices and case study presentations

There will be no lack of interesting content from Qualys at Black Hat next week. Depending on you interests, you might want to make time for some of these talks and …

Google Chrome biohazard
Surprisingly stealthy botnet has been targeting users for years

ESET researchers have unearthed a botnet of some 500,000 infected machines engaged mostly in ad-related fraud by using malicious Chrome extensions, but also Facebook fraud and …

firefighters
Companies unprepared to measure incident response

Companies struggle to keep up with and respond to cyberattacks due to lack of resources, according to Demisto. For example, more than 40 percent of respondents said their …

bridge
New infosec products of the week​: July 21, 2017

Awake Security unveils advanced security analytics solution Awake’s advanced security analytics provide security teams the insights needed to understand the scope and impact …

Don't miss

Cybersecurity news