Router authentication security risks: The hidden dangers of weak CPE credentials
Vulnerable CPE routers can put your entire ISP network at risk! Uncover the consequences of security breaches and protect your core network!
Read MoreVulnerable CPE routers can put your entire ISP network at risk! Uncover the consequences of security breaches and protect your core network!
Read MoreMobile app developers work hard and keeping up with app security eats up a lot of their time and keeps them from doing what they love – developing amazing new mobile apps! The question is, how can we make their lives easier? In this blog Catherine Chambers talks about why zero-touch app security just might be the answer.
Read MoreAlmost 10 years ago, the Open Web Application Security Project (OWASP) published the first version of the Top 10 Mobile Application Vulnerabilities, but where are we now? In this blog, I did a quick review a few of these common vulnerabilities to see if these findings still apply.
Read MoreRecently, I had the pleasure of joining my colleagues Will Hickie and Andrew Hoyt with Security Boulevard for a webinar on Automating App Security with AI: How to Secure a Million Lines of Code in Five Minutes! In this blog we discuss how a company can tell if one of its mobile apps have been hacked and how maybe Mobile Device Management Systems might not be enough.
Read MoreOne of the major issues in the cybersecurity industry is the shortage of cybersecurity professionals. A 2019 study found that there was a global deficit of more than four million cybersecurity professionals and now we need to consider which areas are being impacted the most, how to address this shortage and what’s the best solution going forward.
Read MoreWhy hackers might target your mobile app – the reasons might surprise you! Check out my webcast with Application Security Weekly to find out more about why apps are the new endpoints.
Read MoreIs it worth investing in an internal security team? In this blog, we look at how some software applications have defended themselves from reverse engineering by investing heavily and developing their own custom anti-analysis solutions.
Read MoreWith society being forced to stay home because of the COVID-19 global pandemic, people are increasingly turning to mobile devices and applications to occupy their time. Cyber criminals are seeking out any opportunity they can to take advantage of the current circumstances and hack into devices and networks.
Read MoreWith the increase of mobile applications being deployed, the market for application security testing tools is growing rapidly and the need for additional application protection is essential. While it is important to use application security testing tools to catch any code errors, it is not the same as protecting an application. Application protection tools are designed to make it unprofitable for a hacker to attack an application.
Read MoreSoftware is the invisible fabric that enables the world to interact, transact, and function....
Read More