#Infosec19 Enable Visibility into App Development for Vulnerability Managment
“Pushing left doesn’t fix this, you need to push right too”
More results...
“Pushing left doesn’t fix this, you need to push right too”
While recently examining hundreds of phishing kits for ongoing research, Akamai discovered something interesting – several of the kits included basic vulnerabilities due to flimsy construction or reliance on outdated open source code. Considering the i…
The results of the 2019 European Security Blogger Awards have been announced
Area 1 Security wants to contribute free spear-phising prevention software to political campaigns.
Imperva adds bot management services to its portfolio through the acquisition of Distil Networks.
Over the past year, IRONSCALES identified 11,733 email phishing attacks that underwent at least one permutation.
As cyber-criminals diversify their malware attacks, organizations can bolster defenses by automating attack classification
It’s about the quality of the data shared, and not the quantity
Overlooked vector can be useful part of defense-in-depth approach, says Infoblox
Expert warns of opacity of proprietary systems, data accuracy and bias