The latest edition of the ISMG Security Report features an analysis of whether courts can trust evidence collected by Cellebrite's mobile device forensic tools. Also featured: Report shows attackers' dwell times plummeting; a call for partnership with law enforcement.
The latest edition of the ISMG Security Report features an analysis of ransomware gang REvil’s threat to release stolen Apple device blueprints unless it receives a massive payoff. Also featured: discussions of the importance of a “shift left” strategy and efforts to secure cryptocurrencies.
Brokerage account takeover, supply chain attacks, destructive attacks and those that seek to manipulate time or time stamps are among the latest threats uncovered in the new Modern Bank Heists report authored by Tom Kellermann at VMware Carbon Black.
The key to reducing AppSec risk is pretty simple. It all starts with AppSec visibility and everyone looking at the same data. AppSec visibility data provides the necessary insights to assess risk and drive accountability, to make the right business and operational decisions, and of course to prioritize remediation...
Dr. Chenxi Wang, industry thought leader and analyst, examined the Return on Investment that organizations may realize by using Cobalt’s Pen Testing as a Service (PTaaS) platform. This study took a detailed look at the benefits and costs of deploying Cobalt’s services in comparison with using traditional...
There has been a spike in web shells being detected as ransomware gangs and other attackers increasingly target vulnerable on-premises Microsoft Exchange servers following publication of proof-of-concept attack code for ProxyLogon, which is one of four zero-day flaws patched by Microsoft in early March.
This edition of the ISMG Security Report features an analysis of the Microsoft Exchange on-premises server hacks – from who might have leaked the vulnerability exploits to how ransomware gangs are taking advantage of the flaws. Also featured: Tackling the cybercrime business model; assessing "zero trust."
The pace of digital transformation has reached a speed never before seen, forcing organizations into an “adapt or die” situation. Software is at the center of it all, placing increased pressure on DevOps leaders, AppSec managers, and developers to develop and deploy software faster to keep their organizations...
The latest edition of the ISMG Security Report features cybercrime deterrence lessons learned from the disruption of the Emotet botnet operation. Also featured: An update on attacks tied to Microsoft Exchange flaw exploits; a discussion of the need to update business continuity plans.
Modern application design and the continued adoption of DevSecOps are expanding the
scope of the AST market. Security and risk management leaders will need to meet tighter
deadlines and test more complex applications by seamlessly integrating and automating AST
in the software delivery life cycle.
Application security testing is common, but technology changes such as containers, APIs and open source challenge existing toolsets. Security and risk management leaders must evaluate current capabilities and product roadmaps to ensure tools will contribute value in an evolving business environment.
It’s time to build security in from the start of the SDLC to better manage,
measure, and address risk, empower development teams, and
guarantee secure software delivery at the speed of DevOps.
While financial service organizations are under constant attack from adversaries, there
are specific steps they can...
Public sector organisations worldwide face a
daunting set of challenges as society adjusts to
the current COVID-19 environment. Whether it is
local government, healthcare, law enforcement,
or blue light responders, organisations across all
disciplines that previously depended on in-person
processes have been...
With millions of sports fans to cater to, DAZN
has secure applications high on its agenda. Security comes from the top (their
c-suite) and rolls down to their software developers who understand the value of
a secure application. Application Security Testing (AST) solutions are imperative to
DAZN, so they deliver...
Are you protected from these common AppSec risks?
A single weak point in a line
of code can create an open
door for attackers.
The cost of an average
breach is $3,920,000.
Nearly 80% of apps contain
at least one critical or high