Applications

How to Use Input Sanitization to Prevent Web Attacks

Despite all of our investments in security tools, the codebase can be the weakest link for any organization's cybersecurity. Sanitizing and validating inputs is usually the first layer of defense. ...

AI Coding: A Security Problem?

Andrej Karpathy is a former research scientist and founding member of OpenAI. He was also the senior director of AI at Tesla. Lately, he has been using Copilot, which leverages GPT-3 to generate c...

What is Virtual Patching and How Does It Work?

Virtual patching uses policies, rules and security tools to block access to a vulnerability until it can be patched. Zero-day threats and legacy systems are two ways that vulnerabilities can be cr...

Application Security: Complete Definition, Types & Solutions

Application security is the practice of securing software and data from hackers, whether that application comes from a third party or was developed in house, regardless of where it resides or how it's...

10 Best Open-Source Vulnerability Scanners for 2023

Vulnerability assessment tools scan assets for known vulnerabilities, misconfigurations, and other flaws. These scanners then output reports for IT security and application development operations (Dev...

GitHub Adds New Security Features for Open Source Community

GitHub has announced new features that could improve both developers’ experience and supply chain security. The “private vulnerability” reports announced at GitHub Universe 2022 will allow open-so...

Is the Answer to Vulnerabilities Patch Management as a Service?

Patch management is all about helping organizations manage the process of patching software and applications. It encompasses functions such as testing patches, prioritizing them, deploying them, veri...

Behavioral Analytics in Cybersecurity: Does It Work as Advertised?

In the ever-evolving fight against data loss, data breaches, and data theft in the 21st century, organizations worldwide have turned to a number of cybersecurity solutions, services, and software in ...

Okta ‘Breaches’ Weren’t Really Breaches

With two high-profile breaches this year, Okta, a leader in identity and access management (IAM), made the kind of headlines that security vendors would rather avoid. After seeing headlines like thes...

The Challenges Facing the Passwordless Future

For years the tech industry has promised a shift toward a passwordless future. In 2013, for example, the FIDO Alliance was created to solve the world’s password problem by replacing login technology....

Latest articles