Laden...
The day's top cybersecurity news and in-depth coverage
September 06, 2022
Data security and privacy risks surrounding in-app browsers have been making headlines. These are the threats they pose and steps needed to minimize them. Read more â¶
With the exponential growth of code complexity and demand for secure software, there's no better time for application security and development teams to use IAST. Learn about the benefits of IAST and why Contrast Security has been highlighted by IDC. Download the TechBrief!
Hybrid cloud identity and access management services add complexity and opportunity for attackers to network authentication processes, as recently demonstrated for Azure AD.
These MDR services offer human and machine monitoring of your network to identify and respond to the most likely threats.
The npm Best Practices Guide aims to help JavaScript and TypeScript developers reduce the security risks of using open-source dependencies.
Before Twitter's former CISO sounded the alarm bell, the U.S. government defined steps to counter misinformation and disinformation at the state, local and federal levels.
Ransomware gangs seem to be exploiting concerns over disruptions in the energy and other critical infrastructure sectors.
The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings.
© 2024