The Equifax breach was the largest single breach in history, with 145.5 million records being uncovered. Today, 6 months later, we look at the industry and see what we have learned from Equifax.
The Equifax breach was the largest single breach in history, with 145.5 million records being uncovered. Today, 6 months later, we look at the industry and see what we have learned from Equifax.
The top 5 new open source vulnerabilities in March 2018, including Drupal, Microsoft ChakraCore, Jackson-databind, Moment.js, and Marked.js.
Discover the top 15 security experts to follow on Twitter for the latest updates on application security. Engage with thought leaders.
Discover the challenges of big data security: data sources, infrastructure, and technology issues, and how to keep your big data secure.
Learn about the Equifax data breach, who’s to blame, and the importance of staying on top of open source libraries and vulnerabilities.
Explore the risks of serverless computing on application security. Learn how to navigate security concerns in the digital world.
Discover how AI is revolutionizing open source software management. Learn how automated solutions can help track, detect, and mitigate.
Explore how bug bounty programs offer a win-win for cybersecurity, enabling companies to leverage global talent for robust app security.
What is A Single Page Application Jeff Nibler describes Single Page Applications (SPAs) as the latest evolution in web application design. With SPAs, various JavaScript libraries and tools such as…
Discover the top six vulnerable open source projects, including Apache Tomcat and Struts2, and learn why updating these components is crucial.
Discover the latest Apache Struts vulnerability & how it can impact your application security. Learn how to fix it and protect your apps.
Explore the aftermath of Heartbleed, and the importance of managing open source components for security.
Learn about the Dirty Cow vulnerability impacting Linux and Android distributions. Find out who’s affected, how to protect yourself.
Critical MySQL database vulnerability puts your data at risk. Learn about its specifications, and steps for remediation and mitigation.
Discover the latest in Android application security threats and solutions. Learn how to protect yourself and your users from potential risks.
Learn about the latest Java vulnerability that could be the next Heartbleed. Find out how to protect your Java-based applications.