Applications

Neural Fuzzing: A Faster Way to Test Software Security

Software vulnerabilities are a grave threat to the security of computer systems. They often go undetected for years until it is too late and the consequences are irreversible. In order to find these w...

Open Source Security: A Big Problem

Open source security has been a big focus of this week's Black Hat conference, but no open source security initiative is bolder than the one proffered by the Open Source Security Foundation (OpenSSF)....

NSA, CISA Report Outlines Risks, Mitigations for Kubernetes

Two of the largest government security agencies are laying out the key cyberthreats to Kubernetes, the popular platform for orchestrating and managing containers, and ways to harden the open-source to...

Top Microsegmentation Software for 2021

It seems that no matter how many security technologies, network perimeters, and intrusion prevention safeguards are erected, the bad guys somehow find a means of entry. Enter microsegmentation as a...

The State of Blockchain Applications in Cybersecurity

Blockchain is best known as the database technology facilitating and securing cryptocurrency transactions, but its application to broader cybersecurity issues is just beginning. The brilliance of ...

Best Zero Trust Security Solutions for 2022

    Zero trust security is a concept that's been around for several years, but it may finally be starting to gain traction as a technology product. The prob...

OAuth: Your Guide to Industry Authorization

Nearly a decade ago, the cyber industry was toiling over how to enable access for users between applications and grant access to specific information about the user for authentication and authorizatio...

Point-of-Sale (POS) Security Measures for 2022

  It's a tough time to be a retailer. Massive point-of-sale (POS) breaches continue to make headlines on a regular basis, and they can have a significant impact on ...

Protecting Against Solorigate TTPs: SolarWinds Hack Defenses

A March 2020 software update of the SolarWinds Orion management platform gave malicious actors unhindered access to key government and enterprise networks. Microsoft has dubbed the infamous supply cha...

How to Defend Common IT Security Vulnerabilities

IT security pros have never faced more threats, whether it's from the huge increase in remote work or aggressive nation-state sponsored hackers like those involved in the SolarWinds breach. While ther...

Latest articles