Payment card attacks are nothing new. Cybercriminals have been targeting payment cards for more than a decade. However, there is a disturbing trend of cybercriminals discovering and leveraging novel ways to steal payment cards credentials during online transa...
As applications become increasingly cloud-based – or even, cloud-native – more and more such code is sending data to and from cloud-based stores, both public and private. This makes the methods and controls that such applications use to access the cloud of pa...
In this age of lockdowns, social distancing and working from home, organizations must think carefully about how to extend their networks and services across the internet and into employees’ and contractors’ homes. This makes remote access security management ...
Development tools are growing more advanced; large language models can now write code for us based on simple, plain English requests. Unfortunately, malicious actors also have access to increasingly powerful tools. As a result, cybersecurity risk management h...
Delivering a secure mobile app to users requires developers to prioritize security throughout the software’s development pipeline. An organization’s System Development Life Cycle (SDLC) should include clear and straightforward security instructions that...
With cybersecurity incidents increasing at an alarming rate, modern development teams are transitioning to a DevSecOps framework to integrate security into the entire software development lifecycle (SDLC). This approach helps create more secure and resilient ...
Open-source software dramatically simplifies and speeds up the development process. However, it also carries significant risks in the form of vulnerabilities. The public nature of open-source code means that databases such as Open Source Vulnerabilities ...
Understanding the DevOps Approach to Code Security DevOps generally means integrating software development (dev) and information technology operations (ops) to speed the lifecycle, deliver better features, updates and fixes, and more. What’s sometimes missing...
This new age of Artificial Intelligence is fascinating—and terrifying, too. From ubiquitous digital assistants like Siri and Alexa to usage on factory floors, the impact of AI is dizzying. Your cell phone mostly features a voice assistant. At best, Apple’s Si...
As software applications are increasingly integrated into more aspects of society, cyber threats continue to increase in complexity and frequency. The rapid digital shift brought about by the pandemic allowed people more convenience and flexibility by normali...
Despite widespread awareness of cybersecurity threats, the most common password in 2024 is still “123456.” This simple fact underscores the ongoing challenges in enforcing strong password practices. This is a serious problem, given that almost hal...
While we’ve discussed OWASP (Open Web Application Security Project), it’s importance to the security of applications and development and the standards it sets, there are other aspects that deserve our attention. One of the primary elements of OWASP that deman...