Applications

Top Code Debugging and Code Security Tools

There's a lot of code in the world, and a lot more is created every day. The browser you're reading this article on is likely supported by millions of lines of code. And as even a casual reader would ...

Neural Fuzzing: A Faster Way to Test Software Security

Software vulnerabilities are a grave threat to the security of computer systems. They often go undetected for years until it is too late and the consequences are irreversible. In order to find these w...

Open Source Security: A Big Problem

Open source security has been a big focus of this week's Black Hat conference, but no open source security initiative is bolder than the one proffered by the Open Source Security Foundation (OpenSSF)....

NSA, CISA Report Outlines Risks, Mitigations for Kubernetes

Two of the largest government security agencies are laying out the key cyberthreats to Kubernetes, the popular platform for orchestrating and managing containers, and ways to harden the open-source to...

Top Microsegmentation Software

It seems that no matter how many security technologies, network perimeters, and intrusion prevention safeguards are erected, the bad guys somehow find a means of entry. Enter microsegmentation as a...

The State of Blockchain Applications in Cybersecurity

Blockchain is best known as the database technology facilitating and securing cryptocurrency transactions, but its application to broader cybersecurity issues is just beginning. The brilliance of ...

OAuth: Your Guide to Industry Authorization

Nearly a decade ago, the cyber industry was toiling over how to enable access for users between applications and grant access to specific information about the user for authentication and authorizatio...

Point-of-Sale (POS) Security Measures

  It's a tough time to be a retailer. Massive point-of-sale (POS) breaches continue to make headlines on a regular basis, and they can have a significant impact on ...

SolarWinds Hack Defenses: Protecting Against ‘Solorigate’ TTPs

A March 2020 software update of the SolarWinds Orion management platform gave malicious actors unhindered access to key government and enterprise networks. Microsoft has dubbed the infamous supply cha...

How to Defend Common IT Security Vulnerabilities

IT security pros have never faced more threats, whether it's from the huge increase in remote work or aggressive nation-state sponsored hackers like those involved in the SolarWinds breach. While ther...

Latest articles