Application Security
How CISOs Can Influence API Security Change
Security incidents can cost a chief information security officer (CISO) their job. For example, cybersecurity breaches at Capital One, Uber, Equifax and plenty of others have led to the firing or forced ...
Security Boulevard
Don’t Trust the Security of the Software Supply Chain
Sue Poremba
|
|
Secure Coding
,
security
,
software bill of materials
,
software supply chain
,
zero trust
Now more than ever, organizations are relying on the supply chain for basic business operations. According to Charlie Jones, director of product management with ReversingLabs, there are two reasons for this: The ...
Security Boulevard
The On-Prem WAF is Dead. Long Live the Cloud WAF
It’s time to take a look into the application environment changes and examine whether a WAF is the best solution for protection applications. The post The On-Prem WAF is Dead. Long Live ...
TikTok Abused Kids’ Data — UK Fines it $16 Million
Richi Jennings
|
|
Australia
,
Bytedance
,
children
,
Children and smartphones
,
five eyes
,
information commissioner's office
,
SB Blogwatch
,
TikTok
,
uk
,
Won’t somebody think of the children?
$8.50 per child: UK regulator punishes TikTok at 5.5% of revenue. Says app illegally tracked children ...
Security Boulevard
Splunk: Cybersecurity Dynamics Rapidly Changing
Michael Vizard
|
|
cyberattacks
,
Cybersecurity
,
Enterprise Strategy Group
,
generative AI
,
Splunk
A survey of 1,520 cybersecurity and IT leaders published today found more than half (52%) reporting their organization suffered a data breach in the past two years, with 62% experiencing monthly unplanned ...
Security Boulevard
Sysdig Details Proxyjacking Attack Leveraging Log4j Vulnerability
Sysdig today published a report that described how cybercriminals are exploiting the Log4j vulnerability to gain access to IP addresses that are then sold to entities that resell them. Dubbed proxyjacking, the ...
Security Boulevard
What the TikTok Ban Could Mean for GRC
The White House and TikTok’s critics in Congress have made it clear: They consider TikTok a dangerous social media app and national security threat. Throughout the March 23, 2023, congressional hearing, TikTok ...
Security Boulevard
White House Moves to Address Software Supply Chain Security
No one wants a repeat of the SUNBURST cyberattack, but without any action to improve cybersecurity within the software supply chain, another SUNBURST—or worse—attack is inevitable. And we still may see a ...
Security Boulevard
Beyond SolarWinds: 6 More Notable Software Supply Chain Attacks
rezilion
|
|
Application Security
,
Kaseya
,
SBOM
,
Software Attack Surface Management
,
software bill of materials
,
software supply chain attacks
,
SolarWinds
,
Uncategorized
,
Vulnerability Management
SolarWinds has become almost a household name and for all the wrong reasons: beginning in 2019, the system management company was the target of one of the largest software supply chain attacks ...
Western Digital Hacked: ‘My Cloud’ Data Dead (Even Local Storage!)
Richi Jennings
|
|
cloud storage
,
My Cloud
,
Ransomware
,
SB Blogwatch
,
storage
,
WD
,
Western Digital
,
Western Digital My Cloud
Déjà Vu: Hack of WD systems leads to My Cloud service outage. Owners unable to access files ...
Security Boulevard