An effective threat intelligence solution enables analysts to address, track and investigate advanced attacks such as WannaCry ransomware.
The best way to remediate zero-day threats is to focus on proactively assessing and patching the vulnerabilities that facilitate them.
CISOs must understand the key difference between individual and enterprise endpoint security to adequately protect corporate data.
Security professionals can leverage freely available, open source security tools to protect their environments from threats.
Does agility make the DevOps process less secure? A new survey suggested that, contrary to popular belief, security and agility aren't mutually exclusive.
Although it is one of the most crucial components of any security strategy, web application penetration testing is often neglected.
Security researcher Ed Foudil proposed adding a security.txt to every website to standardize the process of reporting vulnerabilities.
IBM X-Force reported a downward trend in publicly available exploit code, but security teams must still prioritize vulnerability and patch management.
A little-known PDF flaw in a parsing library that was originally discovered six years ago is also present in many contemporary and popular file viewers.
Three Practical Tips That Empower Developers and Prevent Open Source Security Risks From Entering Your Code
There are many benefits to developing software using open source code, but these components can also introduce vulnerabilities into your code.